Title :
A Forensic Analysis of Android Malware -- How is Malware Written and How it Could Be Detected?
Author :
Allix, Kevin ; Jerome, Quentin ; Bissyande, Tegawende F. ; Klein, John ; State, Radu ; Le Traon, Yves
Author_Institution :
Interdiscipl. Centre for Security, Reliability & Trust, Univ. of Luxembourg Luxembourg, Luxembourg, Luxembourg
Abstract :
We consider in this paper the analysis of a large set of malware and benign applications from the Android ecosystem. Although a large body of research work has dealt with Android malware over the last years, none has addressed it from a forensic point of view. After collecting over 500,000 applications from user markets and research repositories, we perform an analysis that yields precious insights on the writing process of Android malware. This study also explores some strange artifacts in the datasets, and the divergent capabilities of state-of-the-art antivirus to recognize/define malware. We further highlight some major weak usage and misunderstanding of Android security by the criminal community and show some patterns in their operational flow. Finally, using insights from this analysis, we build a naive malware detection scheme that could complement existing anti virus software.
Keywords :
Android (operating system); digital forensics; invasive software; Android ecosystem; Android malware; Android security; antivirus software; criminal community; forensic analysis; malware detection; operational flow patterns; writing process; Androids; Bioinformatics; Genomics; Google; Humanoid robots; Malware; Software; Android Security; Digital Forensics; Malware Analysis; Malware development;
Conference_Titel :
Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual
Conference_Location :
Vasteras
DOI :
10.1109/COMPSAC.2014.61