Analysis of malicious and benign android applications

44Citations
Citations of this article
79Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since its establishment, the Android applications market has been infected by a proliferation of malicious applications. Recent studies show that rogue developers are injecting malware into legitimate market applications which are then installed on open source sites for consumer uptake. Often, applications are infected several times. In this paper, we investigate the behavior of malicious Android applications, we present a simple and effective way to safely execute and analyze them. As part of this analysis, we use the Android application sandbox Droidbox to generate behavioral graphs for each sample and these provide the basis of the development of patterns to aid in identifying it. As a result, we are able to determine if family names have been correctly assigned by current anti-virus vendors. Our results indicate that the traditional anti-virus mechanisms are not able to correctly identify malicious Android applications. © 2012 IEEE.

Cite

CITATION STYLE

APA

Alazab, M., Monsamy, V., Batten, L., Tian, R., & Lantz, P. (2012). Analysis of malicious and benign android applications. In Proceedings - 32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012 (pp. 608–616). https://doi.org/10.1109/ICDCSW.2012.13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free