{"title":"Android系统中合谋应用攻击检测的系统信号监控与处理","authors":"I. Khokhlov, Michael Perez, L. Reznik","doi":"10.1109/WNYIPW.2019.8923113","DOIUrl":null,"url":null,"abstract":"This paper investigates a novel colluded application attack's influence on the system's technological signals of an Android OS smartphone. This attack requires two or more applications to collaborate in order to bypass permission restriction mechanisms and leak private data. We implement this attack on a real stock Android OS smartphone and record such technological signals as overall memory consumption, CPU utilization, and CPU frequency. These recordings are studied in order to investigate the feasibility of their employment in building the attack classifiers. In developing those classifiers, we employed various machine learning techniques processing these technological signals. Such machine learning techniques as a feed-forward and long-short term memory neural networks were investigated and compared against each other. The results achieved are presented and analyzed.","PeriodicalId":275099,"journal":{"name":"2019 IEEE Western New York Image and Signal Processing Workshop (WNYISPW)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"System Signals Monitoring and Processing for Colluded Application Attacks Detection in Android OS\",\"authors\":\"I. Khokhlov, Michael Perez, L. Reznik\",\"doi\":\"10.1109/WNYIPW.2019.8923113\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper investigates a novel colluded application attack's influence on the system's technological signals of an Android OS smartphone. This attack requires two or more applications to collaborate in order to bypass permission restriction mechanisms and leak private data. We implement this attack on a real stock Android OS smartphone and record such technological signals as overall memory consumption, CPU utilization, and CPU frequency. These recordings are studied in order to investigate the feasibility of their employment in building the attack classifiers. In developing those classifiers, we employed various machine learning techniques processing these technological signals. Such machine learning techniques as a feed-forward and long-short term memory neural networks were investigated and compared against each other. The results achieved are presented and analyzed.\",\"PeriodicalId\":275099,\"journal\":{\"name\":\"2019 IEEE Western New York Image and Signal Processing Workshop (WNYISPW)\",\"volume\":\"35 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE Western New York Image and Signal Processing Workshop (WNYISPW)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WNYIPW.2019.8923113\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Western New York Image and Signal Processing Workshop (WNYISPW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WNYIPW.2019.8923113","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
System Signals Monitoring and Processing for Colluded Application Attacks Detection in Android OS
This paper investigates a novel colluded application attack's influence on the system's technological signals of an Android OS smartphone. This attack requires two or more applications to collaborate in order to bypass permission restriction mechanisms and leak private data. We implement this attack on a real stock Android OS smartphone and record such technological signals as overall memory consumption, CPU utilization, and CPU frequency. These recordings are studied in order to investigate the feasibility of their employment in building the attack classifiers. In developing those classifiers, we employed various machine learning techniques processing these technological signals. Such machine learning techniques as a feed-forward and long-short term memory neural networks were investigated and compared against each other. The results achieved are presented and analyzed.