Analysis on maliciousness for    mobile applications               Seung-Hyun Seo, Dong-Guen Lee.            Internet Inci...
OutlineIntroductionThreat Types of Mobile MalwareDetection Framework of Malicious Android ApplicationsThe Experiment Resul...
IntroductionAs the Android without any code review or security checks,hackers can easily distribute their malicious applic...
Threat Types of Mobile Malware Information Leakage Monetary Loss Restricted device usage Mobile DDoS                      ...
Detection Framework of Malicious      Android Applications App Collection Phase Static Analysis Phase Dynamic Analysis Pha...
6   2012/11/11
The Experiment ResultsSimple static analysis cannot find distinct differencesbetween malicious apps and normal chatting an...
8   2012/11/11
9   2012/11/11
ConclusionsIn this paper, we proposed a framework for detectingmalicious Android apps using automatic appcollection and an...
Upcoming SlideShare
Loading in …5
×

Analysis on maliciousness for mobile applications

381 views

Published on

Published in: Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
381
On SlideShare
0
From Embeds
0
Number of Embeds
133
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Analysis on maliciousness for mobile applications

  1. 1. Analysis on maliciousness for mobile applications Seung-Hyun Seo, Dong-Guen Lee. Internet Incidents Response Division Korea Internet & Security Agency Seoul, South Korea. 2012 IEEE Reporter: Chi-Wei, Chien (簡綺葳) 1 2012/11/11
  2. 2. OutlineIntroductionThreat Types of Mobile MalwareDetection Framework of Malicious Android ApplicationsThe Experiment ResultsConclusions 2 2012/11/11
  3. 3. IntroductionAs the Android without any code review or security checks,hackers can easily distribute their malicious applications.Previous studies were based on a permission analysisapproach or static analysis approach to determinemalicious behavior. they didnt provide methods toautomatically collect Android apps in the Android market. 3 2012/11/11
  4. 4. Threat Types of Mobile Malware Information Leakage Monetary Loss Restricted device usage Mobile DDoS 4 2012/11/11
  5. 5. Detection Framework of Malicious Android Applications App Collection Phase Static Analysis Phase Dynamic Analysis Phase 5 2012/11/11
  6. 6. 6 2012/11/11
  7. 7. The Experiment ResultsSimple static analysis cannot find distinct differencesbetween malicious apps and normal chatting and securityapps.The analyses of 1,014 apps collected found 19 suspiciousapps that might be malicious as they behaved followingthe malicious behavior patterns defined here. 7 2012/11/11
  8. 8. 8 2012/11/11
  9. 9. 9 2012/11/11
  10. 10. ConclusionsIn this paper, we proposed a framework for detectingmalicious Android apps using automatic appcollection and analysis features.The proposed framework features not only theanalysis of malicious behavior but also monitoring anddetection of malicious apps in the market. 10 2012/11/11

×