SlideShare a Scribd company logo
Presentation Structure
01
Why
DroidSwan?
02
Android and
Malware
03
Building
DroidSwan
05
Extracting
Features
06
Deriving
Feature set
07
DroidSwan
Working
04
Identifying
Features
08
DroidSwan
Performance
Why DroidSwan?
Of all mobile malware
applications target
Android platform
98%
Why DroidSwan?
Of all mobile malware
applications target
Android platform
Decrease in Number of
Malware samples
removed from PlayStore
98%
60%
Why DroidSwan?
338%
Of all mobile malware
applications target
Android platform
Decrease in Number of
Malware samples
removed from PlayStore
Increase in Number of
Malware samples on
Google’s PlayStore
98%
60%
Malware and Android
Malware and Android
Surveillance
Malware and Android
Surveillance
Data Theft
Malware and Android
Surveillance
Data Theft Privacy Invasion
Malware and Android
Surveillance
Data Theft
Botnet Activity
Privacy Invasion
Malware and Android
Surveillance
Impersonation
Data Theft
Botnet Activity
Privacy Invasion
Building DroidSwan
Collecting
Malware and
Benign data set
Updating
classifier with
new data
Feature set
efficiency
analysis
Building
classifier model
Deriving feature
set
Identifying
crucial features
Identifying Features
Features
Suspicious
Permissions
Identifying Features
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Permissions Usage Trends in Malware Samples
Identifying Features
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Suspicious
API Combinations
Identifying Features
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Suspicious
API Combinations
Presence of
Executables
Identifying Features
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Suspicious
API Combinations
Manifest
Violation
Presence of
Executables
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Suspicious
API Combinations
Suspicious
Content URI
Manifest
Violation
Presence of
Executables
Identifying Features
80.57%
Content URI Usage Trends in Malware Samples
40%
78.8%
18%
Extracting Features
APK APK Parser
Suspicious
Permissions
Suspicious permission
Combinations
Extracting Features
APK APK Parser
Dexdump
Suspicious
Permissions
Suspicious permission
Combinations
Suspicious API
Combinations
Suspicious
Content URI
Manifest
Violation
Extracting Features
APK APK Parser
Dexdump
Jar
Disassembler
Executables in
resources
Suspicious
Permissions
Suspicious permission
Combinations
Suspicious API
Combinations
Suspicious
Content URI
Manifest
Violation
Deriving Feature Set
Three variations of feature set considered :
•Weighted feature set with ED as a feature
•Weighted feature set without ED as a feature
•Non-Weighted feature set
Deriving Feature Set
Deriving Feature Set
DroidSwan Working
DroidSwan Performance
ROC curve
DroidSwan Performance
Recall Rate
DroidSwan Performance
Detection Rate
Babu Rajesh V has been
working for three years in
the field of mobile security
and malware analysis. His
areas of interests include
mobile security and
embedded security
Himanshu Pareek has around
six years of experience in
developing and design of
security solutions related to
small sized networks. He has
research papers published on
topics like malware detection
based on behaviour and
application modelling
Mahesh U Patil received
master degree in electronics
and communication. Presently
he is working as Principal
Technical Officer at CDAC. His
research interests include
Mobile Security and
Embedded Systems
Phaninder Reddy has been
working for two years in the
field of mobile security and
malware analysis. His areas
of interests include
machine learning and data
analytics
Our Team
Droid swan

More Related Content

Viewers also liked

Grand Vietnam (20 days)
Grand Vietnam  (20 days) Grand Vietnam  (20 days)
Grand Vietnam (20 days)
vietnamsmile
 
Glassware
GlasswareGlassware
Glassware
thecocktailcamp
 
Dod matrimony ppt 2
Dod matrimony ppt 2Dod matrimony ppt 2
Dod matrimony ppt 2
dodmatrimonialscript
 
Q_SOL Online Point System.Web
Q_SOL Online Point System.WebQ_SOL Online Point System.Web
Q_SOL Online Point System.Web
qsol001
 
Pc ilipp+retirement magic_ilipp_richx
Pc ilipp+retirement magic_ilipp_richxPc ilipp+retirement magic_ilipp_richx
Pc ilipp+retirement magic_ilipp_richx
Paul Bullock CLU ChFC GBA RPA FLMI CEBS
 
Ml ilpp+2nd halfofstoryx
Ml ilpp+2nd halfofstoryxMl ilpp+2nd halfofstoryx
Ml ilpp+2nd halfofstoryx
Paul Bullock CLU ChFC GBA RPA FLMI CEBS
 

Viewers also liked (10)

Grand Vietnam (20 days)
Grand Vietnam  (20 days) Grand Vietnam  (20 days)
Grand Vietnam (20 days)
 
Glassware
GlasswareGlassware
Glassware
 
Dod matrimony ppt 2
Dod matrimony ppt 2Dod matrimony ppt 2
Dod matrimony ppt 2
 
Q_SOL Online Point System.Web
Q_SOL Online Point System.WebQ_SOL Online Point System.Web
Q_SOL Online Point System.Web
 
AnkitBirla
AnkitBirlaAnkitBirla
AnkitBirla
 
AR-2013-14
AR-2013-14AR-2013-14
AR-2013-14
 
Pc ilipp+retirement magic_ilipp_richx
Pc ilipp+retirement magic_ilipp_richxPc ilipp+retirement magic_ilipp_richx
Pc ilipp+retirement magic_ilipp_richx
 
Ml ilpp+2nd halfofstoryx
Ml ilpp+2nd halfofstoryxMl ilpp+2nd halfofstoryx
Ml ilpp+2nd halfofstoryx
 
Sherwin Resume 2
Sherwin Resume 2Sherwin Resume 2
Sherwin Resume 2
 
AnkitBirla
AnkitBirlaAnkitBirla
AnkitBirla
 

Similar to Droid swan

ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
IJNSA Journal
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system for
IJNSA Journal
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
 
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROIDA FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
IJNSA Journal
 
18-mobile-malware.pptx
18-mobile-malware.pptx18-mobile-malware.pptx
18-mobile-malware.pptx
sundar110567
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
 
Why Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and ObservabilityWhy Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and Observability
Eficode
 
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
SEAA 2022
 
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Shakas Technologies
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
tsysglobalsolutions
 
Icsm2011 syer
Icsm2011 syerIcsm2011 syer
Icsm2011 syerSAIL_QU
 
Android security
Android security Android security
Android security
Hassan Abutair
 
MOTODEV App Validator
MOTODEV App ValidatorMOTODEV App Validator
MOTODEV App Validator
Motorola Mobility - MOTODEV
 
Cyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdfCyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdf
OKOKPROJECTS
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
IRJET Journal
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
ijtsrd
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
EC-Council
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
AldoPalominoBravo
 

Similar to Droid swan (20)

ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONSANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
 
Androinspector a system for
Androinspector a system forAndroinspector a system for
Androinspector a system for
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
 
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROIDA FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
 
18-mobile-malware.pptx
18-mobile-malware.pptx18-mobile-malware.pptx
18-mobile-malware.pptx
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Why Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and ObservabilityWhy Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and Observability
 
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
 
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACTIEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
 
Icsm2011 syer
Icsm2011 syerIcsm2011 syer
Icsm2011 syer
 
Android security
Android security Android security
Android security
 
MOTODEV App Validator
MOTODEV App ValidatorMOTODEV App Validator
MOTODEV App Validator
 
Cyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdfCyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdf
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
Malware Detection in Android Applications
Malware Detection in Android ApplicationsMalware Detection in Android Applications
Malware Detection in Android Applications
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
 
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptxEDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
 

Droid swan