2013 International Conference on Availability, Reliability and Security 2013
DOI: 10.1109/ares.2013.93
|View full text |Cite
|
Sign up to set email alerts
|

ANANAS - A Framework for Analyzing Android Applications

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…Extracting app behavioral footprint using Dynalog [10] tool, which has been incorporated into many dynamic analyses systems (such as AASandbox [11], ANANAS [12], Mobile Sandbox [13], and vetDroid [14]). Monkey is a random-based events generation tool that is part of the Android Developers' toolkit [15].…”
Section: Figmentioning
confidence: 99%
See 1 more Smart Citation
“…Extracting app behavioral footprint using Dynalog [10] tool, which has been incorporated into many dynamic analyses systems (such as AASandbox [11], ANANAS [12], Mobile Sandbox [13], and vetDroid [14]). Monkey is a random-based events generation tool that is part of the Android Developers' toolkit [15].…”
Section: Figmentioning
confidence: 99%
“…Several dynamic analysis tools for characterizing Android apps have been published in the literature. The majority of these rely on random-based test input generation using Monkey, for example, AASandbox [11], ANANAS [12], Mobile-Sandbox [13], vetDroid [14], TraceDroid [48], Andrubis [49], Dynalog [8], HADM [50], Maline [51], Glassbox [52], NetworkProfiler [53], Andlatis [54], Hu & Neamtiu [55], and Cai & Ryder [56]. Others such as AppsPlayground [38] used a more intelligent event generation technique, but unlike our paper, did not investigate code coverage capabilities in the context of on performance analysis of machine learning-based malware detection.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, the approach used a runtime analysis, effectively bypassing the need to deal with code/data obfuscation [7]. The recent researches on the detection of malware on mobile platform include [7,8,28,[30][31][32][33][34][35][36].…”
Section: Related Workmentioning
confidence: 99%
“…It uses Androguard to extract static meta-data relating to the app and also utilizes Taintdroid for data leakage detection. Because DroidBox was the first open source dynamic analysis sandbox, it has been used as a building block for several dynamic analysis frameworks such as Sandroid [14], MobileSandbox [15] and Andrubis [16]. Table 1 shows the high level behaviours (features) that are available with DroidBox.…”
Section: A Emulator-based Analysis Sandboxmentioning
confidence: 99%
“…DroidBox is the first open-source dynamic analysis platform for Android. Therefore, it has been employed as a base system by various dynamic analysis platforms, such as Andrubis [16], Mobile-Sandbox [15], and SandDroid [14]. Furthermore, DroidBox only considers a limited set of behaviour, and it is restricted to one kernel version.…”
Section: B) Open-source Frameworkmentioning
confidence: 99%