A3: Automatic Analysis of Android Malware

  • Luoshi Z
  • Yan N
  • Xiao W
  • et al.
N/ACitations
Citations of this article
30Readers
Mendeley users who have this article in their library.

Abstract

Recently, Android malware is spreading rapidly. Although static or dynamic analysis techniques for detecting Android malware can provide a comprehensive view, it is still subjected to time consuming and high cost in deployment and manual efforts. In this paper, we propose A3, an Automatic Analysis of Android malware, to detect Android malware automatically. Unlike traditional reverse-engineering methods, A3 looks for Command & Control (C&C) Server), monitors the sensitive API invoking, and declares Intent-filter automatically. Then it constructs the relationship graph of the function calls and key contexts or paths for detecting Android malware. The experimental results show that A3 can do an effective automatic analysis for Android malware and has a good performance.

Cite

CITATION STYLE

APA

Luoshi, Z., Yan, N., Xiao, W., Zhaoguo, W., & Yibo, X. (2013). A3: Automatic Analysis of Android Malware. In Proceedings of the The 1st International Workshop on Cloud Computing and Information Security (Vol. 52). Atlantis Press. https://doi.org/10.2991/ccis-13.2013.22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free