{"title":"An Analysis of Android Malware Behavior","authors":"Fehmi Jaafar, Gagandeep Singh, P. Zavarsky","doi":"10.1109/QRS-C.2018.00091","DOIUrl":null,"url":null,"abstract":"Android is dominating the smartphone market with more users than any other mobile operating system. But with its growing popularity, interest from attackers has also increased, as the number of malicious applications keeps on rising. To know more about these applications, investigation of their behavior has become very important. In our paper, we present a study that combines static and dynamic analysis of these applications with an aim to analyze their behavior by examining various attributes such as permission, CPU usage, volatile memory, and traffic. The experimental result of the static analysis shows that top permissions are used by malware to access network state, Internet, write external phone state, and read phone state. Our results of runtime experiments show that CPU usage of malicious applications is on average half that of normal applications while in terms of volatile memory usage malicious applications occupied more RAM than legitimate ones. Traffic analysis includes transmission rate between endpoints which is higher in malware compared to normal applications with a higher number of malformed packets. Based on the above-mentioned four attributes, the behavior of malware can be understood and this behavior can assist in differentiating malicious apps from legitimate applications.","PeriodicalId":199384,"journal":{"name":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/QRS-C.2018.00091","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Android is dominating the smartphone market with more users than any other mobile operating system. But with its growing popularity, interest from attackers has also increased, as the number of malicious applications keeps on rising. To know more about these applications, investigation of their behavior has become very important. In our paper, we present a study that combines static and dynamic analysis of these applications with an aim to analyze their behavior by examining various attributes such as permission, CPU usage, volatile memory, and traffic. The experimental result of the static analysis shows that top permissions are used by malware to access network state, Internet, write external phone state, and read phone state. Our results of runtime experiments show that CPU usage of malicious applications is on average half that of normal applications while in terms of volatile memory usage malicious applications occupied more RAM than legitimate ones. Traffic analysis includes transmission rate between endpoints which is higher in malware compared to normal applications with a higher number of malformed packets. Based on the above-mentioned four attributes, the behavior of malware can be understood and this behavior can assist in differentiating malicious apps from legitimate applications.