Your SlideShare is downloading. ×
0
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Analysis on maliciousness for mobile applications
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Analysis on maliciousness for mobile applications

251

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
251
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Analysis on maliciousness for mobile applications Seung-Hyun Seo, Dong-Guen Lee. Internet Incidents Response Division Korea Internet & Security Agency Seoul, South Korea. 2012 IEEE Reporter: Chi-Wei, Chien (簡綺葳) 1 2012/11/11
  • 2. OutlineIntroductionThreat Types of Mobile MalwareDetection Framework of Malicious Android ApplicationsThe Experiment ResultsConclusions 2 2012/11/11
  • 3. IntroductionAs the Android without any code review or security checks,hackers can easily distribute their malicious applications.Previous studies were based on a permission analysisapproach or static analysis approach to determinemalicious behavior. they didnt provide methods toautomatically collect Android apps in the Android market. 3 2012/11/11
  • 4. Threat Types of Mobile Malware Information Leakage Monetary Loss Restricted device usage Mobile DDoS 4 2012/11/11
  • 5. Detection Framework of Malicious Android Applications App Collection Phase Static Analysis Phase Dynamic Analysis Phase 5 2012/11/11
  • 6. 6 2012/11/11
  • 7. The Experiment ResultsSimple static analysis cannot find distinct differencesbetween malicious apps and normal chatting and securityapps.The analyses of 1,014 apps collected found 19 suspiciousapps that might be malicious as they behaved followingthe malicious behavior patterns defined here. 7 2012/11/11
  • 8. 8 2012/11/11
  • 9. 9 2012/11/11
  • 10. ConclusionsIn this paper, we proposed a framework for detectingmalicious Android apps using automatic appcollection and analysis features.The proposed framework features not only theanalysis of malicious behavior but also monitoring anddetection of malicious apps in the market. 10 2012/11/11

×