2016
DOI: 10.1016/j.cose.2016.01.008
|View full text |Cite
|
Sign up to set email alerts
|

Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models

Abstract: The amount of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. The effectiveness of current tools relies on the app model as well as the malware detection algorithm which analyzes the app model. If the model and/or the algorithm is inadequate, then sophisticated attacks that are triggered by specific sequences of events will not be detected.This paper presents a static analysis framework called Dex… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
19
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(22 citation statements)
references
References 26 publications
1
19
0
Order By: Relevance
“…For example, in [88], a framework for detecting information leakage based on source-sink API tracking has been proposed. Also, in [89], a flow analysisbased framework has been proposed for detecting the potential malicious behaviour based on tracking the sensitive information from the source method to the sink method. • Other semantic features In some works, a semantic pattern was generated based on the app's description which crawled from the app store and the generated pattern has been compared with the actual behaviour of the app.…”
Section: Semantic Featuresmentioning
confidence: 99%
See 3 more Smart Citations
“…For example, in [88], a framework for detecting information leakage based on source-sink API tracking has been proposed. Also, in [89], a flow analysisbased framework has been proposed for detecting the potential malicious behaviour based on tracking the sensitive information from the source method to the sink method. • Other semantic features In some works, a semantic pattern was generated based on the app's description which crawled from the app store and the generated pattern has been compared with the actual behaviour of the app.…”
Section: Semantic Featuresmentioning
confidence: 99%
“…The digitized values have been converted into image and the constructed images have been fed to a convolutional neural network which adopted as a classifier. Also, in [89], a static analysis framework called DroidDee-pLearner has been developed to characterize Android malware. Multiple static features have been extracted and a deep learning model has been adopted to distinguish the malware and benign-ware.…”
Section: Clustering Algorithms This Type Of Algorithms Ismentioning
confidence: 99%
See 2 more Smart Citations
“…Authors focus only on main classes and methods, and neglect other callbacks that may be called by the framework. In [13], authors use lifecyle callbacks of Android applications to build a model of the application and then detect malicious behaviors. This approach focuses only on lifecyle callbacks and does not handle other types of implicit calls.…”
Section: Related Workmentioning
confidence: 99%