SlideShare a Scribd company logo
1 of 4
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3506-3509(2018) ISSN: 0975-0290
3506
Android Malware Detection in Official and Third
Party Application Stores
Sangeeta Rani
Reseacrch Scholar, I.K Gujral Punjab Technical University, Punjab, India
Email: parthj6@gmail.com
Kanwalvir Singh Dhindsa
Baba Banda Singh Bahadur.Engg.College, Fatehgarh Sahib,Punjab,India
Email: kanwalvir.singh@bbsbec.ac.in
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
Android is one of the most popular operating system for mobile devices and tablets. The growing number of
Android users and open source nature of this platform has also attracted attackers to target Android devices.
This paper presents the static and dynamic analysis of the Android applications in order to detect malware. In
this work, we have performed permission based and behavioural based filtering of Android applications with the
help of malware analysis tools. Our results revel that 80% of the applications request for dangerous permissions.
13% applications consist of malicious activities. Most of the applications are interested in the device data like
contact lists, IMEI, IMSI, SMS etc. These results clearly indicate the need for better security measures for
Android apps.
Keywords - Android Malware, Static analysis, Dynamic analysis, Permissions, Applications
---------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Jan 10, 2018 Date of Acceptance: Jan 23, 2018
---------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
There has been an enormous growth in the number of
Android applications available both on official and
unofficial stores in the past few years. Due to this attackers
are also targeting Android to steal and misuse private
information of the device users and to gain financial
benefits. Android provides security at different levels. One
of the important security measures is its permission based
framework that provides access controls for various
applications. At the time of installation users grant a set of
permissions for every application, which control its access
to certain resources. However most of the users mostly
ignore these permissions while installing applications,
which may cause malware attacks. Therefore, this work
identifies a set of dangerous permissions and detects
applications that may cause risky behaviour on the basis of
these permissions. Further these risky applications are
analyzed to detect malware using dynamic analysis.
The rest of the paper is as follows: Section II presents
related work. Section III provides methodology of work.
Results are presented in section IV. Lastly, conclusion is
in section V.
II. RELATED WORK
Many researchers have analyzed and detect malware based
on permission system. Felt et al. examined the
effectiveness of installation time permission grant methods
[1]. Barrera et al. performed an experimental analysis on
the effectiveness of Android’s permission sets. They also
discussed some possible upgradation for Android’s
permission model [2]. Felt et al. detected overprivileged
permissions in Android applications available at official
and third party stores [3]. Zhou et al. and Felt et al.
presented the characteristics of Android malware after
performing analysis of the malware samples [4] [5]. Zhou
et al. and Grace et al. developed malware detection tools
DroidRanger and RiskRanker respectively [6] [7]. These
tools can detect both known and unknown malware. Wei
et al. proposed different methods to secure device data
after analyzing the permission model of third party
applications [8]. Holavanalli et al. proposed a tool Flow
Permissions that examines the flow of permission grant
methods within the applications [9]. Zhang et al.
developed VetDroid which is a dynamic analysis tool that
helps to monitor the permission usage behaviour at run
time [10]. Faruki et al. detected malware using static
analysis method which was based on application’s code
and structure. Besides static analysis, dynamic analysis
techniques are also popular to detect malware [11].
Rashidi et al. and Beresford et al. used dynamic analysis to
understand the behaviour of an application at runtime [12]
[13]. Burguera et al. developed Crowdroid for behavioural
based malware detection [14]. They analyzed Android
applications behaviour to differentiate between
applications with same names but different behaviour.
III. METHODOLOGY
Present work focuses on malware detection using both
static and dynamic analysis techniques. Static analysis
refers to the analysis of the source code of the application
without executing the code [15] [16]. Permission based
analysis is an important static analysis technique that
analyze AndroidManifest.XML file included in every
application. As a first step every application is
disassembled and analyzed using open source static
analysis tool Androguard and ApkInspector. These tools
generate AndroidManifest.XML file, from where the
permissions are extracted. It also provides information
about other components like ContentProviders, Services,
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3506-3509(2018) ISSN: 0975-0290
3507
Broadcast receivers and Intents. The extracted permissions
are then compared with a set of dangerous permissions
mostly requested by the malware (a total of 20 permissions
which is considered as the feature set [17]). If the
application is requesting all dangerous permissions then it
is marked as Riskware application. These Riskware
applications are then further analyzed with the help of
dynamic analysis tools. Dynamic analysis refers to detect
the malicious activity performed by the application at
runtime [18]. Dynamic analysis reports generated by
online tools like VirusTotal, ScanDroid and NVISO
ApkScan are analyzed. Run time activities like dynamic
loading of code to install backdoors, connecting to
Command and Control servers, stealing personal
information of the users and sending it outside is
considered as malicious activities and the application
performing it is marked as malware.
A. Dataset
The following datasets have been used:
a) Android Applications
A total of 1900 benign applications have been collected
with the help of a crawler and also manually. These
applications are collected from Google Play store and third
party application stores for Android.
b) Android Malware
This dataset consists of 100 Android applications detected
as malware samples that cover common Android malware
families available in the year 2016. These samples are
collected from two online malware dumps malmr.com and
AndroMalShare.
Figure 1. Implementation Process
IV. RESULTS
A. Permission Based Filtering
Using static analysis tools ApkInspecter and Androgaurd,
AndroidManifest.XML file of the collected applications is
extracted to perform permission based filtering. The
behaviour of an application is strictly controlled by the
permissions. Analysis results revel that 80% of the
applications request dangerous permissions. Applications
that request dangerous permission combinations are
considered as risky applications. The frequently asked
permissions by applications that can pose risky behaviour
are as follows:
Table 1: Frequently requested permissions
INTERNET
READ_PHONE_STATE
WRITE_EXTERNAL_STORAGE
ACCESS_NETWORK_STATE
SEND_SMS
RECEIVE_SMS
RECEIVE_BOOT_COMPLETED
ACCESS_WIFI_STATE
ACCESS_FINE_LOCATION
INSTALL_SHORTCUT
Table 2: Riskware Applications
AppStore Total Apps Riskware
Play Store and Third
Party Store
1900 1520
Out of total 1900 applications collected from official Play
store and third party store 1520 applications request
dangerous permissions. Thus these applications are
marked as Riskware applications. INTERNET and
READ_PHONE_STATE permission is requested by most
of the applications. This permission is required by
embedded ad libraries to work properly. The
WRITE_EXTERNAL_STORAGE permission allows the
application to read or write external storage. Malware use
this permission to update or delete device data. SMS
related permissions are also requested commonly. The
RECEIVE_BOOT_COMPLETED permission assists the
malware to run immediately after booting. The malware
request ACCESS_NETWORK_STATE permission to
access information like network availability, roaming or
local networks etc. ACCESS_WIFI_STATE permission
allows application to access wifi networks and the
malware may use this information to hack the wifi
network
B. Behavioural Filtering
Permission based filtering can result in false positives. So
the next phase examines all the applications that ask
dangerous permissions with dynamic analysis tools.
Dynamic analysis works during the execution of the
application [19]. It detects and maintains log about the file
activities, short messages, network activities, loading of
code performed by the application.
Table 3: Malware applications
AppStore Total
Apps
Riskware Malware
Play Store
and Third
Party Store
1300 1520 350
The results of this analysis disclose the presence of
malware in third party stores and even in official Google
Play store applications. 12% of the collected applications
from official store enclose malware. 28 % of third party
store applications enclose malware.
The behaviour of these malware applications can be
arranged in the following categories:
a) Invasively Collecting Personal Information
The first category includes applications that collect
personal information of the user. 70% of the detected
malware applications access personal information of
Collection of Android applications and malware samples
Permission based filtering of applications using static
analysis tools
Behavioural filtering of applications using dynamic
analysis tools
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3506-3509(2018) ISSN: 0975-0290
3508
device such as IMEI, phone no, contact list, location and
SMS.
b) Unsafely Fetching and Loading Dynamic Code
The second category include loading of dynamic from the
internet. Dynamic loading of code may pose potential
security threat due to two reasons. One reason is that static
analysis tools cannot analyze dynamically loading of code
reliably. Hence it can easily bypassing static analysis
techniques. The second reason is that the downloaded code
can be easily changed at any time. It is difficult to detect
dynamic fetching of code. But it can be caught by
monitoring the loading of classes by java.lang.reflect
package. DexClassLoader class also permits applications
to load random code which is not a part of applications
package file. 36% of malware perform functionality with
the help of dynamic loading of code.
c) Connecting Command and control server
Connection with C&C servers boosts the functionality of
the malware. 58 % of the malware connect with C&C
servers. These servers monitor the device continuously.
Malware sends device information to these servers in
different ways. For example InMobi malware detected in
collected applications sends text messages to these servers.
SMSSpy malware encodes data into JSON format and
sends it to a remote server.
V. CONCLUSION
In this paper, we have analytically examined the security
and privacy issues raised by Android malware. We
analyzed 1900 applications collected from the official
Android Market and third party Android stores. The
results discovered threats to security and privacy exist on
both official and third party stores. Most of the Android
application request for dangerous permissions. Run time
analysis of the applications revel threats range from
collecting device information, connecting with command
and control servers and dynamically loading of code
without user’s awareness. Android’s permissions system
cannot differentiate between actions performed by
dynamic loaded code and those performed by the hosting
application. Thus the current Android security system
provides little indication of the existence of these threats
within any given application. The results surly necessitate
a more secure and robust Android security architecture.
REFERENCES
[1] A. P. Felt, K. Greenwood, and D. Wagner, The
effectiveness of install-time permission systems for third-
party applications, Technical report, University of
California at Berkeley, UCB/EECS-2010-143, Dec 2010.
[2] D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A.
Somayaji, A methodology for empirical analysis of
permission-based security models and its application to
android, Proc. 17th ACM conference on Computer and
communications security, ACM, New York, 2010, 73–84.
[3] A.P. Felt , E. Chin., S. Hanna, D. Song , D. Wagner,
Android permissions demystified, Proc. 8th ACM
conference on Computer and communications security,
New York, USA. 2011b. 627-638.
[4] Y. Zhou and X. Jiang, Dissecting android malware:
Characterization and evolution, Proc. IEEE Symposium on
Security and Privacy, San Francisco, CA, USA, 2012,
95–109.
[5] A. P. Felt, M. Finifter, E. Chin, D. Wagner, A Survey
of Mobile Malware in the Wild, Proc. 1st ACM Workshop
on Security and Privacy in Smartphones and Mobile
Devices (SPSM '11), ACM, New York, USA, 2011, 3-14
[6] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you,
get off of my market: Detecting malicious apps in official
and alternative Android markets. Proceedings of the 19th
Network and Distributed System Security Symposium,
San Diego, CA, 317-326.
[7] M. Grace, Y. Zhou, Q. Zhang, S. Zou and X. Jiang ,
Riskranker: scalable and accurate zero-day android
malware detection, Proc. International Conference on
Mobile Systems, Applications, and Services, London, UK,
2012, 281–294.
[8] X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos,
Malicious android applications in the enterprise: What do
they do and how do we fix it?1, Proc. IEEE 28th
International Conference on Data Engineering Workshops
(ICDEW), 251–254, 2012.
[9] S. Holavanalli, D. Manuel, V. Nanjundaswamy, B.
Rosenberg, F. Shen, S. Y. Ko, and L. Ziarek, Flow
permissions for android, Proc. 28th IEEE/ACM
International Conference on Automated Software
Engineering (ASE), 2013, 652–657,2013.
[10] Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning,
X. S. Wang, and B. Zang, Vetting undesirable behaviors in
android apps with permission use analysis, Proc. 2013
ACM SIGSAC Conference on Computer &
Communications Security, 611–622, 2013.
[11]P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and A.
Bharmal, Androsimilar: Robust statistical feature
signature for android malware detection, Proc.
International Conference on Security of Information and
Networks (SIN’13), Aksaray, Turkey. ACM, 2013, 152–
159
[12] B. Rashidi, C. Fung, and T. Vu, Recdroid: A resource
access permission control portal and recommendation
service for smartphone users, Proc. 2014 ACM MobiCom
Workshop on Security and Privacy in Mobile
Environments (SPME’14), Maui, Hawaii, USA, 2014, 13–
18.
[13] A. R. Beresford, A. Rice, N. Skehin, and R. Sohan,
Mockdroid: Trading privacy for application functionality
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 04 Pages: 3506-3509(2018) ISSN: 0975-0290
3509
on smartphones, Proc. 12th Workshop on Mobile
Computing Systems and Applications (HotMobile’11),
Phoenix, Arizona, USA. ACM, 2011, 49–54.
[14] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani,
Crowdroid: Behavior-based malware detection system for
android, Proc. 1st ACM Workshop on Security and
Privacy in Smartphones and Mobile Devices (SPSM’11),
Chicago, Illinois, USA, 2011, 15–26.
[15] Z. Aung, and W. Zaw, Permission-based Android
malware detection, International Journal of Scientific &
Technology Research, 2(3), 2013
[16] S. Ryo, D. Chiba, and S. Goto, Detecting Android
Malware by Analyzing Manifest Files, Proc. Asia-Pacific
Advanced Network , 2013, 23-31
[17] S. Rani, and K. Dhindsa, Behavioural
Characterization of Android Malware to Detect Similar
Malware, International Journal of Research in
Electronics and Computer Engineering, 5(4), 2017, pp.
509-514
[18] A. Kapratwar, Static and Dynamic Analysis of
Android Malware, Proc. 1st International Workshop on
FORmal methods for Security Engineering In conjunction
with the 3rd International Conference on Information
Systems Security and Privacy, Porto, Portugal, 2017
[19] F. Yuhui, and X. Ning, The Analysis of Android
Malware Behaviors, International Journal of Security and
Its Applications, 9(3), 2015, 335-346
Biographies and Photographs
Sangeeta Rani is a Research Scholar at
the I.K Gujral Punjab Technical
University, Jalandhar, Punjab. Her
research interests include social
network analysis, mobile phone
security and network security. She is currently working as
an Assistant Professor at the Mata Gujri College,
Fatehgarh Sahib, Punjab, India.
Kanwalvir Singh Dhindsa is currently
working as a Professor (CSE) and
Incharge, ERP at the Baba Banda
Singh Bahadur Engg., College,
Fatehgarh Sahib (Punjab), India, with
an overall experience of 17 years in the academia and
research fields of computer science and IT, He is an avid
researcher having guided dissertations of many MTech
and PG students and he is currently guiding seven PhD
scholars. He is also on the reviewer panel of many
esteemed refereed and peer-reviewed journals. His current
research interests include cloud computing, web
engineering, big data, internet of things, database and
security, and mobile computing. He is also life member-
CSI, Fellow IETE, member IEI, and life member-ISCA
.
.

More Related Content

What's hot

IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET Journal
 
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Carlos Laorden
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security SurveyIOSRjournaljce
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
Permission use analysis for vetting undesirable behavior in
Permission use analysis for vetting undesirable behavior inPermission use analysis for vetting undesirable behavior in
Permission use analysis for vetting undesirable behavior inchaitrabhat777
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиSergey Ulankin
 
Detection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksDetection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksAmina WADDIZ
 
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET Journal
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android ReportVinoth Kanna
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningIRJET Journal
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 
Veracode State of Software Security vol 4
Veracode State of Software Security vol 4Veracode State of Software Security vol 4
Veracode State of Software Security vol 4stemkat
 
Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Zahid Qaisar
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesCSCJournals
 
Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesijcsa
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approachijsrd.com
 
COVERT app
COVERT appCOVERT app
COVERT appitba9
 

What's hot (20)

IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
 
An E-Governance Web Security Survey
An E-Governance Web Security SurveyAn E-Governance Web Security Survey
An E-Governance Web Security Survey
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Permission use analysis for vetting undesirable behavior in
Permission use analysis for vetting undesirable behavior inPermission use analysis for vetting undesirable behavior in
Permission use analysis for vetting undesirable behavior in
 
Eurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активностиEurecom уличили приложения для Android в тайной от пользователя активности
Eurecom уличили приложения для Android в тайной от пользователя активности
 
Detection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksDetection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacks
 
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
IRJET- Secured Analysis of Android Applications using Permission Accessing Sy...
 
Mitigating Privilege-Escalation Attacks on Android Report
Mitigating Privilege-Escalation Attacks on Android  ReportMitigating Privilege-Escalation Attacks on Android  Report
Mitigating Privilege-Escalation Attacks on Android Report
 
IJET-V3I1P2
IJET-V3I1P2IJET-V3I1P2
IJET-V3I1P2
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
Veracode State of Software Security vol 4
Veracode State of Software Security vol 4Veracode State of Software Security vol 4
Veracode State of Software Security vol 4
 
Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Icuautomation
IcuautomationIcuautomation
Icuautomation
 
Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approach
 
COVERT app
COVERT appCOVERT app
COVERT app
 

Similar to Android Malware Detection in Official and Third Party Application Stores

ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSIJNSA Journal
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applicationsijtsrd
 
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROIDA FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROIDIJNSA Journal
 
I03402059063
I03402059063I03402059063
I03402059063theijes
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware DetectionIRJET Journal
 
Android_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdfAndroid_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdfTalha Naqash
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...IJECEIAES
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine LearningIRJET Journal
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store IRJET Journal
 
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...theijes
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET Journal
 
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING O...
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING O...MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING O...
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING O...IJNSA Journal
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDIRJET Journal
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docx
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docxAndroid Permissions DemystifiedAdrienne Porter Felt, Erika.docx
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docxdurantheseldine
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedNoNameCon
 

Similar to Android Malware Detection in Official and Third Party Application Stores (20)

ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
 
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROIDA FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
 
I03402059063
I03402059063I03402059063
I03402059063
 
Android Malware Detection
Android Malware DetectionAndroid Malware Detection
Android Malware Detection
 
Android_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdfAndroid_Nougats_security_issues_and_solutions.pdf
Android_Nougats_security_issues_and_solutions.pdf
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
IRJET- Android Malware Detection using Machine Learning
IRJET-  	  Android Malware Detection using Machine LearningIRJET-  	  Android Malware Detection using Machine Learning
IRJET- Android Malware Detection using Machine Learning
 
Android security
Android security Android security
Android security
 
H017445260
H017445260H017445260
H017445260
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
Proposed Workable Process Flow with Analysis Framework for Android Forensics ...
 
IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...IRJET - System to Identify and Define Security Threats to the users About The...
IRJET - System to Identify and Define Security Threats to the users About The...
 
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING O...
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING O...MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING O...
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING O...
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docx
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docxAndroid Permissions DemystifiedAdrienne Porter Felt, Erika.docx
Android Permissions DemystifiedAdrienne Porter Felt, Erika.docx
 
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Android Malware Detection in Official and Third Party Application Stores

  • 1. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3506-3509(2018) ISSN: 0975-0290 3506 Android Malware Detection in Official and Third Party Application Stores Sangeeta Rani Reseacrch Scholar, I.K Gujral Punjab Technical University, Punjab, India Email: parthj6@gmail.com Kanwalvir Singh Dhindsa Baba Banda Singh Bahadur.Engg.College, Fatehgarh Sahib,Punjab,India Email: kanwalvir.singh@bbsbec.ac.in -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- Android is one of the most popular operating system for mobile devices and tablets. The growing number of Android users and open source nature of this platform has also attracted attackers to target Android devices. This paper presents the static and dynamic analysis of the Android applications in order to detect malware. In this work, we have performed permission based and behavioural based filtering of Android applications with the help of malware analysis tools. Our results revel that 80% of the applications request for dangerous permissions. 13% applications consist of malicious activities. Most of the applications are interested in the device data like contact lists, IMEI, IMSI, SMS etc. These results clearly indicate the need for better security measures for Android apps. Keywords - Android Malware, Static analysis, Dynamic analysis, Permissions, Applications --------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Jan 10, 2018 Date of Acceptance: Jan 23, 2018 --------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION There has been an enormous growth in the number of Android applications available both on official and unofficial stores in the past few years. Due to this attackers are also targeting Android to steal and misuse private information of the device users and to gain financial benefits. Android provides security at different levels. One of the important security measures is its permission based framework that provides access controls for various applications. At the time of installation users grant a set of permissions for every application, which control its access to certain resources. However most of the users mostly ignore these permissions while installing applications, which may cause malware attacks. Therefore, this work identifies a set of dangerous permissions and detects applications that may cause risky behaviour on the basis of these permissions. Further these risky applications are analyzed to detect malware using dynamic analysis. The rest of the paper is as follows: Section II presents related work. Section III provides methodology of work. Results are presented in section IV. Lastly, conclusion is in section V. II. RELATED WORK Many researchers have analyzed and detect malware based on permission system. Felt et al. examined the effectiveness of installation time permission grant methods [1]. Barrera et al. performed an experimental analysis on the effectiveness of Android’s permission sets. They also discussed some possible upgradation for Android’s permission model [2]. Felt et al. detected overprivileged permissions in Android applications available at official and third party stores [3]. Zhou et al. and Felt et al. presented the characteristics of Android malware after performing analysis of the malware samples [4] [5]. Zhou et al. and Grace et al. developed malware detection tools DroidRanger and RiskRanker respectively [6] [7]. These tools can detect both known and unknown malware. Wei et al. proposed different methods to secure device data after analyzing the permission model of third party applications [8]. Holavanalli et al. proposed a tool Flow Permissions that examines the flow of permission grant methods within the applications [9]. Zhang et al. developed VetDroid which is a dynamic analysis tool that helps to monitor the permission usage behaviour at run time [10]. Faruki et al. detected malware using static analysis method which was based on application’s code and structure. Besides static analysis, dynamic analysis techniques are also popular to detect malware [11]. Rashidi et al. and Beresford et al. used dynamic analysis to understand the behaviour of an application at runtime [12] [13]. Burguera et al. developed Crowdroid for behavioural based malware detection [14]. They analyzed Android applications behaviour to differentiate between applications with same names but different behaviour. III. METHODOLOGY Present work focuses on malware detection using both static and dynamic analysis techniques. Static analysis refers to the analysis of the source code of the application without executing the code [15] [16]. Permission based analysis is an important static analysis technique that analyze AndroidManifest.XML file included in every application. As a first step every application is disassembled and analyzed using open source static analysis tool Androguard and ApkInspector. These tools generate AndroidManifest.XML file, from where the permissions are extracted. It also provides information about other components like ContentProviders, Services,
  • 2. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3506-3509(2018) ISSN: 0975-0290 3507 Broadcast receivers and Intents. The extracted permissions are then compared with a set of dangerous permissions mostly requested by the malware (a total of 20 permissions which is considered as the feature set [17]). If the application is requesting all dangerous permissions then it is marked as Riskware application. These Riskware applications are then further analyzed with the help of dynamic analysis tools. Dynamic analysis refers to detect the malicious activity performed by the application at runtime [18]. Dynamic analysis reports generated by online tools like VirusTotal, ScanDroid and NVISO ApkScan are analyzed. Run time activities like dynamic loading of code to install backdoors, connecting to Command and Control servers, stealing personal information of the users and sending it outside is considered as malicious activities and the application performing it is marked as malware. A. Dataset The following datasets have been used: a) Android Applications A total of 1900 benign applications have been collected with the help of a crawler and also manually. These applications are collected from Google Play store and third party application stores for Android. b) Android Malware This dataset consists of 100 Android applications detected as malware samples that cover common Android malware families available in the year 2016. These samples are collected from two online malware dumps malmr.com and AndroMalShare. Figure 1. Implementation Process IV. RESULTS A. Permission Based Filtering Using static analysis tools ApkInspecter and Androgaurd, AndroidManifest.XML file of the collected applications is extracted to perform permission based filtering. The behaviour of an application is strictly controlled by the permissions. Analysis results revel that 80% of the applications request dangerous permissions. Applications that request dangerous permission combinations are considered as risky applications. The frequently asked permissions by applications that can pose risky behaviour are as follows: Table 1: Frequently requested permissions INTERNET READ_PHONE_STATE WRITE_EXTERNAL_STORAGE ACCESS_NETWORK_STATE SEND_SMS RECEIVE_SMS RECEIVE_BOOT_COMPLETED ACCESS_WIFI_STATE ACCESS_FINE_LOCATION INSTALL_SHORTCUT Table 2: Riskware Applications AppStore Total Apps Riskware Play Store and Third Party Store 1900 1520 Out of total 1900 applications collected from official Play store and third party store 1520 applications request dangerous permissions. Thus these applications are marked as Riskware applications. INTERNET and READ_PHONE_STATE permission is requested by most of the applications. This permission is required by embedded ad libraries to work properly. The WRITE_EXTERNAL_STORAGE permission allows the application to read or write external storage. Malware use this permission to update or delete device data. SMS related permissions are also requested commonly. The RECEIVE_BOOT_COMPLETED permission assists the malware to run immediately after booting. The malware request ACCESS_NETWORK_STATE permission to access information like network availability, roaming or local networks etc. ACCESS_WIFI_STATE permission allows application to access wifi networks and the malware may use this information to hack the wifi network B. Behavioural Filtering Permission based filtering can result in false positives. So the next phase examines all the applications that ask dangerous permissions with dynamic analysis tools. Dynamic analysis works during the execution of the application [19]. It detects and maintains log about the file activities, short messages, network activities, loading of code performed by the application. Table 3: Malware applications AppStore Total Apps Riskware Malware Play Store and Third Party Store 1300 1520 350 The results of this analysis disclose the presence of malware in third party stores and even in official Google Play store applications. 12% of the collected applications from official store enclose malware. 28 % of third party store applications enclose malware. The behaviour of these malware applications can be arranged in the following categories: a) Invasively Collecting Personal Information The first category includes applications that collect personal information of the user. 70% of the detected malware applications access personal information of Collection of Android applications and malware samples Permission based filtering of applications using static analysis tools Behavioural filtering of applications using dynamic analysis tools
  • 3. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3506-3509(2018) ISSN: 0975-0290 3508 device such as IMEI, phone no, contact list, location and SMS. b) Unsafely Fetching and Loading Dynamic Code The second category include loading of dynamic from the internet. Dynamic loading of code may pose potential security threat due to two reasons. One reason is that static analysis tools cannot analyze dynamically loading of code reliably. Hence it can easily bypassing static analysis techniques. The second reason is that the downloaded code can be easily changed at any time. It is difficult to detect dynamic fetching of code. But it can be caught by monitoring the loading of classes by java.lang.reflect package. DexClassLoader class also permits applications to load random code which is not a part of applications package file. 36% of malware perform functionality with the help of dynamic loading of code. c) Connecting Command and control server Connection with C&C servers boosts the functionality of the malware. 58 % of the malware connect with C&C servers. These servers monitor the device continuously. Malware sends device information to these servers in different ways. For example InMobi malware detected in collected applications sends text messages to these servers. SMSSpy malware encodes data into JSON format and sends it to a remote server. V. CONCLUSION In this paper, we have analytically examined the security and privacy issues raised by Android malware. We analyzed 1900 applications collected from the official Android Market and third party Android stores. The results discovered threats to security and privacy exist on both official and third party stores. Most of the Android application request for dangerous permissions. Run time analysis of the applications revel threats range from collecting device information, connecting with command and control servers and dynamically loading of code without user’s awareness. Android’s permissions system cannot differentiate between actions performed by dynamic loaded code and those performed by the hosting application. Thus the current Android security system provides little indication of the existence of these threats within any given application. The results surly necessitate a more secure and robust Android security architecture. REFERENCES [1] A. P. Felt, K. Greenwood, and D. Wagner, The effectiveness of install-time permission systems for third- party applications, Technical report, University of California at Berkeley, UCB/EECS-2010-143, Dec 2010. [2] D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proc. 17th ACM conference on Computer and communications security, ACM, New York, 2010, 73–84. [3] A.P. Felt , E. Chin., S. Hanna, D. Song , D. Wagner, Android permissions demystified, Proc. 8th ACM conference on Computer and communications security, New York, USA. 2011b. 627-638. [4] Y. Zhou and X. Jiang, Dissecting android malware: Characterization and evolution, Proc. IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 2012, 95–109. [5] A. P. Felt, M. Finifter, E. Chin, D. Wagner, A Survey of Mobile Malware in the Wild, Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11), ACM, New York, USA, 2011, 3-14 [6] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. Proceedings of the 19th Network and Distributed System Security Symposium, San Diego, CA, 317-326. [7] M. Grace, Y. Zhou, Q. Zhang, S. Zou and X. Jiang , Riskranker: scalable and accurate zero-day android malware detection, Proc. International Conference on Mobile Systems, Applications, and Services, London, UK, 2012, 281–294. [8] X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, Malicious android applications in the enterprise: What do they do and how do we fix it?1, Proc. IEEE 28th International Conference on Data Engineering Workshops (ICDEW), 251–254, 2012. [9] S. Holavanalli, D. Manuel, V. Nanjundaswamy, B. Rosenberg, F. Shen, S. Y. Ko, and L. Ziarek, Flow permissions for android, Proc. 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2013, 652–657,2013. [10] Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang, Vetting undesirable behaviors in android apps with permission use analysis, Proc. 2013 ACM SIGSAC Conference on Computer & Communications Security, 611–622, 2013. [11]P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and A. Bharmal, Androsimilar: Robust statistical feature signature for android malware detection, Proc. International Conference on Security of Information and Networks (SIN’13), Aksaray, Turkey. ACM, 2013, 152– 159 [12] B. Rashidi, C. Fung, and T. Vu, Recdroid: A resource access permission control portal and recommendation service for smartphone users, Proc. 2014 ACM MobiCom Workshop on Security and Privacy in Mobile Environments (SPME’14), Maui, Hawaii, USA, 2014, 13– 18. [13] A. R. Beresford, A. Rice, N. Skehin, and R. Sohan, Mockdroid: Trading privacy for application functionality
  • 4. Int. J. Advanced Networking and Applications Volume: 09 Issue: 04 Pages: 3506-3509(2018) ISSN: 0975-0290 3509 on smartphones, Proc. 12th Workshop on Mobile Computing Systems and Applications (HotMobile’11), Phoenix, Arizona, USA. ACM, 2011, 49–54. [14] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, Crowdroid: Behavior-based malware detection system for android, Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM’11), Chicago, Illinois, USA, 2011, 15–26. [15] Z. Aung, and W. Zaw, Permission-based Android malware detection, International Journal of Scientific & Technology Research, 2(3), 2013 [16] S. Ryo, D. Chiba, and S. Goto, Detecting Android Malware by Analyzing Manifest Files, Proc. Asia-Pacific Advanced Network , 2013, 23-31 [17] S. Rani, and K. Dhindsa, Behavioural Characterization of Android Malware to Detect Similar Malware, International Journal of Research in Electronics and Computer Engineering, 5(4), 2017, pp. 509-514 [18] A. Kapratwar, Static and Dynamic Analysis of Android Malware, Proc. 1st International Workshop on FORmal methods for Security Engineering In conjunction with the 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal, 2017 [19] F. Yuhui, and X. Ning, The Analysis of Android Malware Behaviors, International Journal of Security and Its Applications, 9(3), 2015, 335-346 Biographies and Photographs Sangeeta Rani is a Research Scholar at the I.K Gujral Punjab Technical University, Jalandhar, Punjab. Her research interests include social network analysis, mobile phone security and network security. She is currently working as an Assistant Professor at the Mata Gujri College, Fatehgarh Sahib, Punjab, India. Kanwalvir Singh Dhindsa is currently working as a Professor (CSE) and Incharge, ERP at the Baba Banda Singh Bahadur Engg., College, Fatehgarh Sahib (Punjab), India, with an overall experience of 17 years in the academia and research fields of computer science and IT, He is an avid researcher having guided dissertations of many MTech and PG students and he is currently guiding seven PhD scholars. He is also on the reviewer panel of many esteemed refereed and peer-reviewed journals. His current research interests include cloud computing, web engineering, big data, internet of things, database and security, and mobile computing. He is also life member- CSI, Fellow IETE, member IEI, and life member-ISCA . .