Artificial User Emulator to Detect Intelligent Malware on Android

  • Singh S
  • Singh S
  • Mishra B
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

Given that most emulator based analysis environment have many static and dynamic differences from a real device used by a user, such environments can be easily tricked by an intelligent malware which may prey upon specific details like IMEI number, button press, accelerometer, GPS coordinates etc. to know whether it is in an emulator thereafter it can act benignly and pass the test undetected. This, and other vulnerabilities have been recognized by this paper and to enhance the detection capability of dynamic analysis environments, we present a framework with a twofold objective, to emulate artificial user behavior and, to help unravel malware's true behavior. Furthermore, our framework is divided into two major categories based on dynamic and static properties of a Smartphone. The framework is tested with an open-source sandbox environment and an existing emulator detection application.

Cite

CITATION STYLE

APA

Singh, S., Singh, S., & Mishra, B. (2015). Artificial User Emulator to Detect Intelligent Malware on Android. International Journal of Intelligent Computing Research, 6(4), 640–646. https://doi.org/10.20533/ijicr.2042.4655.2015.0079

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free