DocumentCode :
153676
Title :
Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source Code
Author :
Chia-Mei Chen ; Je-Ming Lin ; Gu-Hsin Lai
Author_Institution :
Dept. of Inf. Manage., Nat. Sun Yat-sen Univ., Kaohsiung, Taiwan
fYear :
2014
fDate :
9-10 June 2014
Firstpage :
1
Lastpage :
6
Abstract :
Mobile devices have become powerful and popular. Most Internet applications are ported to mobile platform. Confidential personal information such as credit card and passwords are stored in mobile device for convenience. Therefore, mobile devices become the attack targets due to financial gain. Mobile applications are published in many market platforms without verification, hence malicious mobile applications can be deployed in such marketplaces. Two approaches for detecting malware, dynamic and static analysis, are commonly used in the literature. Dynamic analysis requires is that analyst run suspicious apps in a controlled environment to observe the behavior of apps to determine if the app is malicious or not. However, Dynamic analysis is time consuming, as some mobile application might be triggered after certain amount of time or special input sequence. In this paper static analysis is adopted to detect mobile malware and sensitive information is tracked to check if it is been released or used by malicious malware. In this paper, we present a mobile malware detection approach which is based on data flow of the reversed source code of the application. The proposed system tracks the data flow to detect and identify malicious behavior of malware in Android system. To validate the performance of proposed system, 252 malware form 19 families and 50 free apps from Google Play are used. The results proved that our method can successfully detecting malicious behaviours of Android APPs with the TPR 91.6%.
Keywords :
Android (operating system); data flow analysis; invasive software; mobile computing; source code (software); Android APP; Google Play; Internet applications; TPR; confidential personal information storage; controlled environment; data flow; dynamic analysis; malware malicious behavior detection; malware malicious behavior identification; market platforms; mobile application malicious behavior detection; mobile devices; mobile malware detection approach; mobile platform; performance evaluation; reversed source code; sensitive information tracking; source code; static analysis; Androids; Humanoid robots; Malware; Mobile communication; Smart phones; Software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trustworthy Systems and their Applications (TSA), 2014 International Conference on
Conference_Location :
Taichung
Print_ISBN :
978-1-4799-6565-6
Type :
conf
DOI :
10.1109/TSA.2014.10
Filename :
6956704
Link To Document :
بازگشت