Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models

نویسندگان

  • Guillermo Suarez-Tangil
  • Mauro Conti
  • Juan E. Tapiador
  • Pedro Peris-Lopez
چکیده

Malware for current smartphone platforms is becoming increasingly sophisticated. The presence of advanced networking and sensing functions in the device is giving rise to a new generation of targeted malware characterized by a more situational awareness, in which decisions are made on the basis of factors such as the device location, the user profile, or the presence of other apps. This complicates behavioral detection, as the analyst must reproduce very specific activation conditions in order to trigger malicious payloads. In this paper, we propose a system that addresses this problem by relying on stochastic models of usage and context events derived from real user traces. By incorporating the behavioral particularities of a given user, our scheme provides a solution for detecting malware targeting such a specific user. Our results show that the properties of these models follow a power-law distribution: a fact that facilitates an efficient generation of automatic testing patterns tailored for individual users, when done in conjunction with a cloud infrastructure supporting device cloning and parallel testing. We report empirical results with various representative case studies, demonstrating the effectiveness of this approach to detect complex activation patterns.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Smartphone Malware Detection Framework Based on Artificial Immunology

With the sharp increase in the number of smartphones, the Android platform pose to becoming a market leader that makes the need for malware analysis on this platform an urgent issue. The current Artificial Immune-Based malware detection systems research focus on traditional computers that uses information from OS or network, but the smartphone software behavior has its own structure and semanti...

متن کامل

Study of Malware Detection Technique for Apk and SDK File Using Artificial Immune

The word wide sharply increase in the number of smartphones user, the Android platform pose to becoming a market fugleman that makes the need for malware analysis on this platform an urgent issue. The current Artificial Immune Based malware detection systems they focus on traditional computers that uses information from OS or network, but the smartphone software behavior has its own structure a...

متن کامل

Detecting Android Root Exploits by Learning from Root Providers

Malware that are capable of rooting Android phones are arguably, the most dangerous ones. Unfortunately, detecting the presence of root exploits in malware is a very challenging problem. This is because such malware typically target specific Android devices and/or OS versions and simply abort upon detecting that an expected runtime environment (e.g., specific vulnerable device driver or precond...

متن کامل

A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones

Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given the battery, computing power, and bandwidth limitations inherent to such mobile devices, detection of malware on them is a research challenge that requires a different approach than the ones used for desktop/laptop co...

متن کامل

Infrastructure for Detecting Android Malware

Malware for smartphones have sky-rocketed these last years, particularly for Android platforms. To tackle this threat, services such as Google Bouncer have intended to counter-attack. However, it has been of short duration since the malware have circumvented the service by changing their behaviors. Therefore, we propose a malware taxonomy, a survey of attack vectors to better understand the And...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014