Mobile Malware Classification via System Calls and Permission for GPS Exploitation

  • Mohd M
  • ‘Afif M
N/ACitations
Citations of this article
16Readers
Mendeley users who have this article in their library.

Abstract

Now-a-days smartphones have been used worldwide for an effective communication which makes our life easier. Unfortunately, currently most of the cyber threats such as identity theft and mobile malwares are targeting smartphone users and based on profit gain. They spread faster among the users especially via the Android smartphones. They exploit the smartphones through many ways such as through Global Positioning System (GPS), SMS, call log, audio or image. Therefore to detect the mobile malwares, this paper presents 32 patterns of permissions and system calls for GPS exploitation by using covering algorithm. The experiment was conducted in a controlled lab environment, by using static and dynamic analyses, with 5560 of Drebin malware datasets were used as the training dataset and 500 mobile apps from Google Play Store for testing. As a result, 21 out of 500 matched with these 32 patterns. These new patterns can be used as guidance for all researchers in the same field in identifying mobile malwares and can be used as the input for a formation of a new mobile malware detection model.

Cite

CITATION STYLE

APA

Mohd, M., & ‘Afif, M. (2017). Mobile Malware Classification via System Calls and Permission for GPS Exploitation. International Journal of Advanced Computer Science and Applications, 8(6). https://doi.org/10.14569/ijacsa.2017.080636

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free