The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.25
|View full text |Cite
|
Sign up to set email alerts
|

Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware

Abstract: Abstract-Smartphones and mobile devices are rapidly becoming indispensable devices for many users. Unfortunately, they also become fertile grounds for hackers to deploy malware. There is an urgent need to have a "security analytic & forensic system" which can facilitate analysts to examine, dissect, associate and correlate large number of mobile applications. An effective analytic system needs to address the following questions: In this paper, we present the design and implementation of DroidAnalytics, a signa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
97
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 175 publications
(98 citation statements)
references
References 15 publications
0
97
0
1
Order By: Relevance
“…But nowadays applications are being built on other languages too. [4] Eclipse IDE was the Application Software that was used to build android applications until Android Studio became the officially supported software application by Google Inc. to develop android applications. However there are many other online and offline tools to develop android application.…”
Section: Android Application-an Overviewmentioning
confidence: 99%
“…But nowadays applications are being built on other languages too. [4] Eclipse IDE was the Application Software that was used to build android applications until Android Studio became the officially supported software application by Google Inc. to develop android applications. However there are many other online and offline tools to develop android application.…”
Section: Android Application-an Overviewmentioning
confidence: 99%
“…Different permissions have different purposes associated with them but they are used in order to limit the access of the application to the critical resources of device such as camera, SMS storage and Bluetooth permissions, etc. After careful inspection of these permissions, it is up to the user whether he wants to install the application or not [12]. There are four major categories of permissions: Normal, Dangerous, Signature and SignatureOrSystem [22].…”
Section: A Android Permission Frameworkmentioning
confidence: 99%
“…The ICC very smoothly takes care of transferring the request from user to the destination applications. After that applications can access the components or services of other applications as a service [12]. This ICC process is used by malware applications too in order to control the other applications and perform malicious activities on the device.…”
Section: B Application Sandboxingmentioning
confidence: 99%
“…DroidAnalytics [27] is a signature based analytic system which extract and analyze the apps at op-code level. It not only generates the signature but also associate the malware with existing malwares after identifying the malicious content.…”
Section: ) Signature Based Approachmentioning
confidence: 99%