SlideShare a Scribd company logo
USING GOOD APPS for
detection of malware in
android systems
by Deepanjan Kundu
Guide: Prof. R.K.Shyamasundar
DETECTION
Earlier methods of virus and spyware scanners are obsolete
and some new static methods such as model checking, control
flow checking etc. for detection.
But many code obfuscation techniques such as binary
obfuscation using opaque constants can oversome such static
methods.
We need something different.
GOAL
1. Malware authors are using advanced techniques to evade
detection by anti-virus products and polymorphic malware now
becomes the de facto standard. Static analysis may not be
sufficient.
2. In this project, we shall arrive methods to detect
infection of android apps., using their dynamic behaviour. We
use the signature from ‘benign’ applications and use them to
detect infection. This is the opposite of the traditional
method and fits quite well in the context of Android System.
CHANGING FRAMEWORK
1. Identify sensitive API functions for android
2. Mark them by generating specific logs from them(eg. some
message like “BTP”)
3. Generate the log and obtain it using adb logcat
4. Collect only the ones with a BTP mark inside them with
grep
5. TID and PID problem solved. Also as fine as android
framework
Contd.
● Camera functions(done)
● Location data (GPS)
● Bluetooth functions(done)
● Telephony functions(done)
● SMS/MMS functions(done)
● Network/data connections(done)
● Write
Action CLasses
● Not all the API functions are security sensitive. So,
keep only those actions whose APIs are needed for
ensuring security.
● Classify the useful APIs into abstract classes. This
helps to greatly reduce the size of the behaviour without
losing a lot of information.
● Note that if two consecutive actions have the same class
symbol and the same input resource we keep only the first
copy and remove the later.
● Done for 62 APIs over 16 classes.
Abstract Activity
● We may replace the action sequences with (t 1 , O) where
O is the symbol corresponding to the high-level action
● Commonly occurring patterns (involving non-standard
resources) also have to be taken into account.
● For example, getCallCapabilities, getCalldetails,
getParent are all Call-Metadata based APIs and hence are
marked by common class symbol A.(Used by Spywares). The
Sequence BA, where B is for constructor function of the
Call Class, stands is an action sequence denoted by a.
This sequence generally takes place when a call happens.
Regular expression as SIgnature
1. “A.B” + “A.C” = “A.(B + C)”
2. “A m .B” + “A n .B” = “A min(m,n)+ .B”
3. “A m .B” + “A n .C” = “A min(m,n)+ .(B + C)”
4. A” + “A.B” = “A. ” + “A.B” = “A.( + B)”
Used the above properties to keep on updating the regular
expression(L1+L2), which is adding language to the existing
language, as we keep on using more logs for the application.
A sample result
E4|c1).(F3|E1).(c1+|c1).(E1|F1).(F1|E2).(E1|F3).(F1|L1).(G1|J
1).(c1|E1).(F1|J1).(G1|N1).(F4|O1).(G1|N1).(c1|O1).(F1|E1).(E
1|K1).(F4|J2).(G1|L2).(c1|F8).(F3|c1).(G1|I1).(c1|E6).(F1|I1)
.(e1|E1.I1.E1.G1.F2.c1.I1).(e1|E1).(e1|I1).(e1|E1).(e1|I1).(e
1|E1).(e1|G1).(e1|F2).(e1|c1).(e1|I1).(e1|E1).(e1|I1).(e1|E1)
.(e1|I1).(e1|E1).(e1|G1).(e1|F1).(e1|E1).(e1|F1).(e1|c1).(e1|
I1).(e1|E1).(e1|F1).(e1|I1).(e1|E1).(e1|I1).(e1|E1).(e1|F1).(
e1|G1).(e1|F2).(e1|c1).(e1|I1).(e1|E1).(e1|I1).(e1|E1).(e1|I1
).(e1|E1)
TO be done
1. The system needs a lot of polishing. Using Android
framework for such dynamic signature generation is new
and hence needs to be polished. All the steps could see
several improvements and could be covered in more depth.
2. Experiments to compare how this method would stand out as
compared to others for android systems.
THANK
YOU
References
[1] N.V.Narendra Kumar R.K.Shyamasundar George Sebastian
Saurav Yashaswee. Algorithmic Detection of Malware via
Semantic Signatures
[2] N.V.Narendra Kumar, R.K.Shyamasundar, Vivek Goswami,
Richya Bansal. Metamorphic Virus: Is it Amenable for
Algorithmic Detection?
[3] N.V.Narendra Kumar Harshit J. Shah R.K.Shyamasundar.
Benchmarking Program Behaviour for Detecting Malware
Infection
[4] Pallavi Maiya Aditya Kanade Rupak Majumdar. Race
Detection for Android Applications
[5] https://code.google.com/p/droidbox/

More Related Content

Similar to [IITB BTP 2015 Dec] Dynamic detection of malware in android OS.pptx

Mining Fix Patterns for FindBugs Violations
Mining Fix Patterns for FindBugs ViolationsMining Fix Patterns for FindBugs Violations
Mining Fix Patterns for FindBugs Violations
Dongsun Kim
 
Embedded system
Embedded systemEmbedded system
Embedded system
silpak19
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET Journal
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1
Cysinfo Cyber Security Community
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
IRJET Journal
 
iOS,From Development to Distribution
iOS,From Development to DistributioniOS,From Development to Distribution
iOS,From Development to Distribution
Tunvir Rahman Tusher
 
A preliminary study on using code smells to improve bug localization
A preliminary study on using code smells to improve bug localizationA preliminary study on using code smells to improve bug localization
A preliminary study on using code smells to improve bug localization
krws
 
Bcsl 031 solve assignment
Bcsl 031 solve assignmentBcsl 031 solve assignment
S D D Program Development Tools
S D D  Program  Development  ToolsS D D  Program  Development  Tools
S D D Program Development Tools
gavhays
 
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Lastline, Inc.
 
Proposal -co_win_india_valardigital-converted
Proposal  -co_win_india_valardigital-convertedProposal  -co_win_india_valardigital-converted
Proposal -co_win_india_valardigital-converted
UpendraSharma53
 
Binary code obfuscation through c++ template meta programming
Binary code obfuscation through c++ template meta programmingBinary code obfuscation through c++ template meta programming
Binary code obfuscation through c++ template meta programming
nong_dan
 
JAMES_[1].docx
JAMES_[1].docxJAMES_[1].docx
JAMES_[1].docx
Katecate1
 
Framework Engineering Revisited
Framework Engineering RevisitedFramework Engineering Revisited
Framework Engineering Revisited
YoungSu Son
 
Fundamentals of computer programming by Dr. A. Charan Kumari
Fundamentals of computer programming by Dr. A. Charan KumariFundamentals of computer programming by Dr. A. Charan Kumari
Fundamentals of computer programming by Dr. A. Charan Kumari
THE NORTHCAP UNIVERSITY
 
Debugger & Profiler in NetBeans
Debugger & Profiler in NetBeansDebugger & Profiler in NetBeans
Debugger & Profiler in NetBeans
Huu Bang Le Phan
 
Дмитрий Копляров , Потокобезопасные сигналы в C++
Дмитрий Копляров , Потокобезопасные сигналы в C++Дмитрий Копляров , Потокобезопасные сигналы в C++
Дмитрий Копляров , Потокобезопасные сигналы в C++
Sergey Platonov
 
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...
Hafez Kamal
 
MINI PROJECT s.pptx
MINI PROJECT s.pptxMINI PROJECT s.pptx
MINI PROJECT s.pptx
arjunchithanoor
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf
 

Similar to [IITB BTP 2015 Dec] Dynamic detection of malware in android OS.pptx (20)

Mining Fix Patterns for FindBugs Violations
Mining Fix Patterns for FindBugs ViolationsMining Fix Patterns for FindBugs Violations
Mining Fix Patterns for FindBugs Violations
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1Advanced malwareanalysis training session2 botnet analysis part1
Advanced malwareanalysis training session2 botnet analysis part1
 
IRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep LearningIRJET- Android Malware Detection using Deep Learning
IRJET- Android Malware Detection using Deep Learning
 
iOS,From Development to Distribution
iOS,From Development to DistributioniOS,From Development to Distribution
iOS,From Development to Distribution
 
A preliminary study on using code smells to improve bug localization
A preliminary study on using code smells to improve bug localizationA preliminary study on using code smells to improve bug localization
A preliminary study on using code smells to improve bug localization
 
Bcsl 031 solve assignment
Bcsl 031 solve assignmentBcsl 031 solve assignment
Bcsl 031 solve assignment
 
S D D Program Development Tools
S D D  Program  Development  ToolsS D D  Program  Development  Tools
S D D Program Development Tools
 
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in FirmwareUsing Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
Using Static Binary Analysis To Find Vulnerabilities And Backdoors in Firmware
 
Proposal -co_win_india_valardigital-converted
Proposal  -co_win_india_valardigital-convertedProposal  -co_win_india_valardigital-converted
Proposal -co_win_india_valardigital-converted
 
Binary code obfuscation through c++ template meta programming
Binary code obfuscation through c++ template meta programmingBinary code obfuscation through c++ template meta programming
Binary code obfuscation through c++ template meta programming
 
JAMES_[1].docx
JAMES_[1].docxJAMES_[1].docx
JAMES_[1].docx
 
Framework Engineering Revisited
Framework Engineering RevisitedFramework Engineering Revisited
Framework Engineering Revisited
 
Fundamentals of computer programming by Dr. A. Charan Kumari
Fundamentals of computer programming by Dr. A. Charan KumariFundamentals of computer programming by Dr. A. Charan Kumari
Fundamentals of computer programming by Dr. A. Charan Kumari
 
Debugger & Profiler in NetBeans
Debugger & Profiler in NetBeansDebugger & Profiler in NetBeans
Debugger & Profiler in NetBeans
 
Дмитрий Копляров , Потокобезопасные сигналы в C++
Дмитрий Копляров , Потокобезопасные сигналы в C++Дмитрий Копляров , Потокобезопасные сигналы в C++
Дмитрий Копляров , Потокобезопасные сигналы в C++
 
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...
NanoSec Conference 2019: Code Execution Analysis in Mobile Apps - Abdullah Jo...
 
MINI PROJECT s.pptx
MINI PROJECT s.pptxMINI PROJECT s.pptx
MINI PROJECT s.pptx
 
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
 

Recently uploaded

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 

Recently uploaded (20)

Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 

[IITB BTP 2015 Dec] Dynamic detection of malware in android OS.pptx

  • 1. USING GOOD APPS for detection of malware in android systems by Deepanjan Kundu Guide: Prof. R.K.Shyamasundar
  • 2. DETECTION Earlier methods of virus and spyware scanners are obsolete and some new static methods such as model checking, control flow checking etc. for detection. But many code obfuscation techniques such as binary obfuscation using opaque constants can oversome such static methods. We need something different.
  • 3. GOAL 1. Malware authors are using advanced techniques to evade detection by anti-virus products and polymorphic malware now becomes the de facto standard. Static analysis may not be sufficient. 2. In this project, we shall arrive methods to detect infection of android apps., using their dynamic behaviour. We use the signature from ‘benign’ applications and use them to detect infection. This is the opposite of the traditional method and fits quite well in the context of Android System.
  • 4.
  • 5.
  • 6. CHANGING FRAMEWORK 1. Identify sensitive API functions for android 2. Mark them by generating specific logs from them(eg. some message like “BTP”) 3. Generate the log and obtain it using adb logcat 4. Collect only the ones with a BTP mark inside them with grep 5. TID and PID problem solved. Also as fine as android framework
  • 7. Contd. ● Camera functions(done) ● Location data (GPS) ● Bluetooth functions(done) ● Telephony functions(done) ● SMS/MMS functions(done) ● Network/data connections(done) ● Write
  • 8. Action CLasses ● Not all the API functions are security sensitive. So, keep only those actions whose APIs are needed for ensuring security. ● Classify the useful APIs into abstract classes. This helps to greatly reduce the size of the behaviour without losing a lot of information. ● Note that if two consecutive actions have the same class symbol and the same input resource we keep only the first copy and remove the later. ● Done for 62 APIs over 16 classes.
  • 9. Abstract Activity ● We may replace the action sequences with (t 1 , O) where O is the symbol corresponding to the high-level action ● Commonly occurring patterns (involving non-standard resources) also have to be taken into account. ● For example, getCallCapabilities, getCalldetails, getParent are all Call-Metadata based APIs and hence are marked by common class symbol A.(Used by Spywares). The Sequence BA, where B is for constructor function of the Call Class, stands is an action sequence denoted by a. This sequence generally takes place when a call happens.
  • 10. Regular expression as SIgnature 1. “A.B” + “A.C” = “A.(B + C)” 2. “A m .B” + “A n .B” = “A min(m,n)+ .B” 3. “A m .B” + “A n .C” = “A min(m,n)+ .(B + C)” 4. A” + “A.B” = “A. ” + “A.B” = “A.( + B)” Used the above properties to keep on updating the regular expression(L1+L2), which is adding language to the existing language, as we keep on using more logs for the application.
  • 12. TO be done 1. The system needs a lot of polishing. Using Android framework for such dynamic signature generation is new and hence needs to be polished. All the steps could see several improvements and could be covered in more depth. 2. Experiments to compare how this method would stand out as compared to others for android systems.
  • 14. References [1] N.V.Narendra Kumar R.K.Shyamasundar George Sebastian Saurav Yashaswee. Algorithmic Detection of Malware via Semantic Signatures [2] N.V.Narendra Kumar, R.K.Shyamasundar, Vivek Goswami, Richya Bansal. Metamorphic Virus: Is it Amenable for Algorithmic Detection? [3] N.V.Narendra Kumar Harshit J. Shah R.K.Shyamasundar. Benchmarking Program Behaviour for Detecting Malware Infection
  • 15. [4] Pallavi Maiya Aditya Kanade Rupak Majumdar. Race Detection for Android Applications [5] https://code.google.com/p/droidbox/