Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 324-328.doi: 10.11896/j.issn.1002-137X.2016.11A.076

Previous Articles     Next Articles

Security Survey on Android Application Based on Dynamic Analysis

NING Zhuo, HU Ting and SUN Zhi-xin   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Because Android operating system is powerful and it is easy to develop ,it has not only become the world’s first share of the smartphone in the past few years,but also become a prime target for malicious attacks.In this paper,we briefly introduced the Android malware and its detection methods firstly.Then we summarized and analyzed some latest and accurate dynamic analysis techniques in Android security and introduced the technology works,technical solutions,technology performance levels and test results from multidimensional perspectives.Finally,we presented a few directions that are worthy of further research.

Key words: Android,Malware,Dynamic analysis

[1] Analytics S.Global Business Smartphone Quarterly TrackingQ4 2015.https://www.strategyanalytics.com/access-services/enterprise/mobile-workforce/market-data/report-detail/global-business-smartphone-quarterly-tracking-q4-2015#.VxX2J7IgIjY
[2] The 2015 U.S.Mobile App Report.https://www.comscore.com/Insights/Presentations-and-Whitepapers/2015/The-2015-US-Mobile-App-Report
[3] Labs M.Mobile Threat Report:What’s on the Horizon for 2016.http://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2016.pdf
[4] Ded:Decompiling Android applications.http://siis.cse.psu.edu/ded
[5] Dex2Jar.Android decompiling with Dex2jar.http://code.google.com/p/dex2jar
[6] 屈延文.软件行为学[M].北京:电子工业出版社,2004
[7] Blsing T,Batyuk L,Schmidt A D,et al.An android application sandbox system for suspicious software detection[C]∥2010 5th International Conference on Malicious and Unwanted Software (MALWARE).IEEE,2010:55-62
[8] Enck W,Gilbert P,Han S,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[J].ACM Transactions on Computer Systems (TOCS),2014,32(2):5
[9] Desnos A,Lantz P.Droidbox:An android application sandboxfor dynamic analysis.URL.https://code.google.com/p/droidbox,2014
[10] Yan L K,Yin H.Droidscope:seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis[C]∥Presented as part of the 21st USENIX Security Sympo-sium (USENIX Security 12).2012:569-584
[11] Portokalidis G,Homburg P,Anagnostakis K,et al.Paranoid Android:versatile protection for smartphones[C]∥Proceedings of the 26th Annual Computer Security Applications Conference.ACM,2010:347-356
[12] Weichselbaum L,Neugschwandtner M,Lindorfer M,et al.Andrubis:Android malware under the magnifying glass[R].Vienna University of Technology,Tech.Rep.TRISECLAB-0414,2014
[13] Rastogi V,Chen Y,Enck W.AppsPlayground:automatic security analysis of smartphone applications[C]∥Proceedings of the third ACM conference on Data and application security and privacy.ACM,2013:209-220
[14] API Monitor.Rohitab Batra.http://www.rohitab.com/apimonitor
[15] Drozer-A Comprehensive Security and Attack Framework forAndroid.https://www.mwrinfosecurity.com/products/drozer
[16] Faruki P,Bhandari S,Laxmi V,et al.DroidAnalyst:SynergicApp Framework for Static and Dynamic App Analysis[M]∥Recent Advances in Computational Intelligence in Defense and Security.Springer International Publishing,2016:519-552
[17] Shabtai A,Kanonov U,Elovici Y,et al.“Andromaly”:a beha-vioral malware detection framework for android devices[J].Journal of Intelligent Information Systems,2012,38(1):161-190
[18] Burguera I,Zurutuza U,Nadjm-Tehrani S.Crowdroid:behavior-based malware detection system for android[C]∥Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.ACM,2011:15-26
[19] Zheng C,Zhu S,Dai S,et al.Smartdroid:an automatic systemfor revealing ui-based trigger conditions in android applications[C]∥Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.ACM,2012:93-104
[20] Tam K,Khan S J,Fattori A,et al.CopperDroid:Automatic Reconstruction of Android Malware Behaviors[C]∥NDSS.2015
[21] Spreitzenbarth M,Schreck T,Echtler F,et al.Mobile-Sandbox:combining static and dynamic analysis with machine-learning techniques[J].International Journal of Information Security,2015,14(2):141-153
[22] Zhang Y,Yang M,Yang Z,et al.Permission use analysis for vetting undesirable behaviors in android apps[J].IEEE Transactions on Information Forensics and Security,2014,9(11):1828-1842
[23] Xu R,Sadi H,Anderson R.Aurasium:Practical policy enforcement for android applications[C]∥Presented as part of the 21st USENIX Security Symposium (USENIX Security 12).2012:539-552
[24] Zheng M,Sun M,Lui J.Droidtrace:A ptrace based android dynamic analysis system with forward execution capability[C]∥2014 International Wireless Communications and Mobile Computing Conference (IWCMC).IEEE,2014:128-133

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!