Successfully reported this slideshow.
Your SlideShare is downloading. ×

Web-based Security Analysis Tool for Android Applications

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Loading in …3
×

Check these out next

1 of 1 Ad

Web-based Security Analysis Tool for Android Applications

Download to read offline

a web-based security analysis tool for android applications poster session at Advanced Cyber Security Center Annual Conference 2014, Boston, Nov 5th, 2014.

a web-based security analysis tool for android applications poster session at Advanced Cyber Security Center Annual Conference 2014, Boston, Nov 5th, 2014.

Advertisement
Advertisement

More Related Content

Similar to Web-based Security Analysis Tool for Android Applications (20)

Recently uploaded (20)

Advertisement

Web-based Security Analysis Tool for Android Applications

  1. 1. WebVbasedhSecurityhAnalysishToolh forhAndroidhApplications ComputerhSciencehDepartmentPhMetropolitanhCollege NebiyuhFelekePhTandhyhSimanjuntakPhWenjiehShiPhYutinghZhangPhLouhChitkushevhh naberraPhtandhyPhwjshiPhdanazhPhltc@bu.edu Architecture OnNgoingIWork OurITool EveryhfifthhAndroidVbasedhdevicehwithhKasperskyhsolutionshwash attackedhbyhmalwarehduringhreportedhperiod OtherIWebNbasedIAnalysisITools Motivation www.idc.com www.kaspersky.com www.kaspersky.com Anubis AIwebIportalIofIandroidIapplicationsIsecurity ApplicationISecurityIAnalysisIbasedIonICategory ImplicitIOpenIomponentsIinIFinanceIandIMedicalIApplications PercentageIofITotalIOverIPrivilegeIApplicationsIbasedIonICategory ProposedIWork AIframeworkItoIanalyzeItheIsecurityIofIandroidIapplicationsIthroughIstaticIanalysis ProposeIandIimplementIaInumberIofImetricsIcomplementaryItoIthoseIinImanyIexistingIwebNbasedIanalysisItools: IdentifyIOverIPrivilege IdentifyIReNDelegation IdentifyIDangerousIPermissionsICombinationI IdentifyIOpenIComponents IdentifyIHiddenIFileIandICodeILoading IdentifyIRootIExploitIandIMaliciousIDomain AnalysishToolhPage SearchhToolhPage ApplicationISecurityIEvolutionIAnalysis IdentifyIandIclassifyIapplicationsIwithIsimilar functionalityIbasedIonIapplicationsEIdescriptionsIusingI keywordIanalysis InvestigateItheIassociationIbetweenIkeywordsIand otherIsecurityImetricsIsuchIasIpermissions PerformIbothIindividualIandIcollectiveIanalysis ReNdelegation OpenIComponents OverNprivilege DangerousIPermissionsICombination HiddenIFiles MaliciousIDomains RootIExploit CodeILoading TypesIofIMetricsIChangedI DistributionhofhAddedhVulnerabilities DistributionhofhDeletedhVulnerabilities ProposedIWork IdentifyImoreIsecurityImetricsIthatIcanIbe usedIforIevolutionIanalysis,IincludingIthose usedIinIotherIexistingItools InvestigateItheIpossibleIsecurityIevolution patternsIofIapplications InvestigateItheIpossibleIsecurityIpatternsIofI applicationsIwithIsimilarIfunctionality NumberIofITypesIofIMetricsIChangedI PercentageIofIDatasetI MetricsIinclude: DetailsIofIThreeIMetricsI TypeIofIMetricsI PercentageIofIDatasetI NumberIofIAddedIVulnerabilitiesI PercentageIofIApplicableIDatasetI PercentageIofIApplicableIDatasetI NumberIofIDeletedIVulnerabilitiesI TotalIDownloadedIApplicationsIbasedIonICategory IPercentageIofIRootIExploitIApplicationsIbasedIonICategory TotalINumberI Category TotalIPercentageI Category TotalIPercentageI Category InvestigateIpossibleIupdateIattacks, particularlyIthroughIanomalyIdetection

×