Android Malware Detection Protection A Survey
Android Malware Detection Protection A Survey
net/publication/297591972
Article in International Journal of Advanced Computer Science and Applications · February 2016
DOI: 10.14569/IJACSA.2016.070262
CITATIONS READS
104 9,620
4 authors, including:
Mansoor Ahmed
ADAPT Centre / Maynooth University
86 PUBLICATIONS 1,271 CITATIONS
SEE PROFILE
All content following this page was uploaded by Munam Ali Shah on 14 March 2016.
Abstract—Android has become the most popular smartphone embed malicious content into their applications. The users‟
operating system. This rapidly increasing adoption of Android sensitive data can be easily compromised and can be
has resulted in significant increase in the number of malwares transferred to other servers. Furthermore, the existence of third
when compared with previous years. There exist lots of party application stores contribute in spreading malwares for
antimalware programs which are designed to effectively protect Android because Google Play also hosts the applications of
the users’ sensitive data in mobile systems from such attacks. In third-party developers. Android official market uses Bouncer
this paper, our contribution is twofold. Firstly, we have analyzed for protection of marketplace against malwares [5]. However,
the Android malwares and their penetration techniques used for Bouncer does not analyze the vulnerabilities of the uploaded
attacking the systems and antivirus programs that act against
apps. Malware developers take advantage of vulnerabilities
malwares to protect Android systems. We categorize many of the
most recent antimalware techniques on the basis of their
among apps by repackaging the popular apps of Google Play
detection methods. We aim to provide an easy and concise view and distributing them on other third-party app-stores. This
of the malware detection and protection mechanisms and deduce degrades the reputation of the app-store and of the reputation of
their benefits and limitations. Secondly, we have forecast the developer. Malwares includes computer viruses, Trojan
Android market trends for the year up to 2018 and provide a horses, adware, backdoors, spywares and other malicious
unique hybrid security solution and take into account both the programs which are designed to disrupt or damage the
static and dynamic analysis an android application. operating system and to steal personal, financial, or business
information. Malware developers use code obfuscation
Keywords—Android; Permissions; Signature methods, dynamic execution, stealth techniques, encryption
and repackaging to bypass the existing antimalware techniques
I. INTRODUCTION provided by Android platform.
Since 2008, the rate of smartphone adoption has increased
tremendously. Smartphones provide different connectivity
options such as Wi-Fi, GSM, GPS, CDMA and Bluetooth etc.
which make them a ubiquitous device. Google says, 1.3 million
Android devices are being activated each day [1]. Android
operating system left its competitors far behind by capturing
more than 78% of total market share in 2013 [2]. Gartner
report 2013 of smartphone sales shows that there is 42.3%
increase in sales of smartphones in comparison with 2012.
According to International data corporation IDC, Android OS
dominates with 82.8% of total market shares in 2Q 2015 [3].
Figure 1 shows the market shares of Android operating system
on yearly basis. It could be observed that Android has become
the most widely used operating system over the years.
Android platform offers sophisticated functionalities at
Fig. 1. Android Market Shares
very low cost and has become the most popular operating
system for handheld devices. Apart from the Android
In order to prevent such malwares, it is important to have
popularity, it has become the main target for attackers and
accurate and deep understanding of them so that security
malware developers. The official Android market hosts
measures to protect users‟ data could be taken accordingly.
millions of applications that are being downloaded by the users
There are large numbers of attack scenarios where an attacker
in a large number everyday [4]. Android offers an open market
can compromise a user‟s data by taking advantage of the
model where no any application is verified by any security
vulnerabilities of Android operating system. For example, a
expert and this makes Android an easy target for developers to
463 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
464 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
paired devices. Android.Obad.OS is the example of Bluetooth of app .This process of repackaging is done by reverse-
worm [17]. engineering tools. During repackaging, malicious authors
change the signature of repackaged app and so the app seems
D. Spyware new to the antimalware. TrendMicro report have shown that
Nickspy [11] and GPSSpy [18] are the examples of spyware 77% of the top 50 free apps available in Google Play are
apps which appear as benign app, but it actually monitors the repackaged [22].
user‟s confidential information such as messages, contacts,
bank mTANs, location etc. for some undesirable consequences. B. Drive By Download
Personal spywares can install the malicious payload without It refers to an unintentional download of malware in the
the victim‟s knowledge. It sends the user‟s information such as background. Drive by download attacks occur when a user visit
text messages, contacts etc. to the attacker who installed that a website that contains malicious content and injects malware
software on victim‟s device [6]. into the victim‟s device without the user‟s knowledge.
Malware developers use Android/NotCompatible [23] which is
E. Botnets one of the drive-by download app.
Botnet is a network of compromised Android devices.
Botmaster, a remote server, controls the botnet through the C. Dynamic Payloads
C&C network. Geinimi [11] is one of the Android botnets. Malwares also penetrate into Android devices through
dynamic payload technique. They encrypt the malicious
F. Ransomwares content and embed it within APK resources. After installation,
Ransomware prevent the user from accessing their data on the app decrypts the encrypted malicious payload and executes
device by locking the device, until ransom amount is paid. the malicious code. Some malwares, instead of embedding
FakeDefender.B [19] is a malware that masquerades itself as payload as resource, download the malicious content from
avast!, an antivirus. It locks the victim‟s device and force the remote servers dynamically and are not detected by static
user to pay ransom amount to unlock the device. analysis approach [24].
G. Riskwares D. Stealth Malware Techniques
Riskwares are the legitimate software exploited by the On Android device malware scanners cannot perform deep
malicious authors to reduce the performance of device or harm analysis because of the availability of limited resources such as
the data e.g., delete, copy or modify etc. [20]. Table 1 below battery. Malware developers exploit these hardware
shows the top malware types detected in 2015 by TrendMicro vulnerabilities and obfuscate the malicious code to easily
[21]. bypass the antimalware. Different stealth techniques such as
key permutation, dynamic loading, native code execution, code
TABLE I. TOP ANDROID MALWARE TYPES IN 2015 encryption and java reflection are used to attack the victim‟s
device.
465 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
466 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
Ref. [28] has shown that most of the time developers have performance of permission based detection of malware and
declared the permissions that are not actually required by the showed that more than 81% of malicious apps samples can be
application which makes it difficult to detect the malicious detected by the permission based detection method. Proposed
behavior of application. Antimalware analyzes the Android method provides the quick filter for malware detection but the
Manifest.xml file where all the permissions for the resources performance values generated by the classifiers are not perfect
required by the app are mentioned. Stowaway [28] exposes the and we cannot completely rely on those results.
permission over privilege problem in Android where an app
requests more permissions than it actually uses. Stowaway Sanz Borja et al. [33] presented PUMA for detection of
performs static analysis to determine the API calls invoked by malicious apps by analyzing the requested permissions for
the application and then it maps the permissions required by application. They used permission tags such as <uses-
the API calls. They found that one third applications are over permission> and <uses-features> present in
privileged among 940 Android application samples. It cannot AndroidManifest.xml file to analyze the malicious behavior of
resolve the API calls invoked by applications with the use of apps and applied different classifier algorithms on dataset of
java reflections. 357 benign apps and 249 malicious apps. The solution provides
high detection rate but results generated have high false
In [29], authors have proposed a light weight malware positives rate also it is not adequate for efficient detection of
detection mechanism which only analyze the manifest file and malware it still requires information related to other features
extract the information such as permissions, intent filters ( and dynamic analysis.
action, category and priority), process name and number of
redefined permissions to detect the malicious behavior of an Shin et al. [34] used a state machine based approach and
application. After extracting such information, they compare it formally analyze the permission based Android security model.
with the keyword list provide in the proposed method and then They also verified that the specified system satisfy the security
calculate the malignancy score. They used Weka [30] which is property.
a data mining tool for calculation of threshold value. At last Tang, Wei et al. [35] proposed a Security Distance Model
they compare the malignancy score with threshold value and for mitigation of Android malware. Security Distance Model is
classify the app as malware if malignancy score exceeds based on the concept that not a single permission is enough for
threshold value. They have used 365 samples to test the an application to threaten the security of Android devices. For
efficiency of proposed solution and the solution provides 90% example an application requesting permission
accurate detection. It is cost saving mechanism as it only READ_PHONE_STATE can access the phone number and
includes the analysis of manifest file and can be implemented IMEI but it cannot move data out of the device. There must be
in other detection architectures easily to detect malwares a combination of permissions to affect the security model of
efficiently. Also it can detect even those malwares that remain device such as INTERNET permission allows to concept the
undetected by signature based detection method. This proposed device with the network and will be needed to move data to
solution is limited to manifest file information. Also it cannot some remote server. The SD measure the dangerous level of
detect the adware samples. application on the basis of permissions requested by the app.
C. Y. Haung et al. [31] proposed a method for better Authors classify the combinations of permissions into four
detection of permission based malware detection which groups and assigned threat points (TP) to each group such as
includes the analysis of both requested and required TP-0, 1, 5 and 25 to Safe SD, Normal SD, Dangerous SD and
permissions as most of the time malware authors declare more Severe SD. Before the installation of new application it
permissions in the manifest file than they actually require for calculates the threat point from the combination of permissions
the application. Also it analyses the easy to retrieve features requested by the application. That helps the user to get aware
and then labels the application as benign or malware. Three of more dangerous permissions while installation of app. It can
different labeling types are used for this purpose which easily detect the unknown malwares with very high threat
includes site based labeling; scanner based labeling and mixed points. They found 500 threat points for the Geinimi malware
labeling. In site based labeling it labels the app as benign if it is which is a very clear variation from benign apps. A limitation
downloaded from Google official app market and if it is of this solution includes that applications with threat points
downloaded from some malicious source then the app is between 50 and 100 are not easy to identify as benign and
labeled as malicious. In the second labeling scheme, if the malware. They could be the benign apps with such permission
antivirus scanner declares the app as benign the app is label as combinations or malwares.
benign and same for the malware case. In the mixed labeling Enck et al. [36] developed KIRIN, a tool that provides light
the app is labeled on the basis of both site based and scanner weight certification at installation time. It defines the security
based labels. After labeling all the samples are divided into rules and simply compares the requested permissions of app
three datasets and requested permissions of these datasets are with its security rules and certifies the app as malware if it fails
analyzed by the machine learning algorithms such as Naive to pass all the security rules. The installation of app is aborted
Bayes, AdaBoost, Support Vector Machine and Decision Tree if the app is attributed as malware. Authors have tested 311
[32]. On the basis of results generated by these classifiers we applications downloaded from official Android market and
can evaluate the performance of permission based detection found that 5 applications failed to pass the specified rules.
method. in [31] authors have performed experiment on data set Proposed solution is light weight as it only analyzes the
of 124,769 benign and 480 malicious apps. They analyzed the Menifest.xml file. The limitation of KIRIN includes that it may
467 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
also declare some legitimate applications as malware because requires extension in analysis of concurrency and reflection
the information provided for application certification is not handling.
adequate for detection of malware.
Zhou et al. [42] implemented DroidMOSS that extract the
DroidMat [37] is a tool that extracts the information from Dalvik Byte code sequence and developer information of
manifest file such as permissions, message passing through application by using baksmali tool [43] and generate finger
intents and API call tracing to analyze the behavior of prints for each app by using fuzzy hashing techniques to create
application. It applies K-means clustering that increases the the fixed sized 80 byte signature to detect the repackaged
malware detection capability and classify the applications as applications. On the basis of similarity score it identifies the
benign or malware by using KNN algorithm [38]. It is more repackaged apps. Authors have applied DroidMOSS to test 200
efficient than Androgaurd [39] as it takes lesser time to identify samples from six different third party market places and
the 1,738 apps as malware or benign. Also it is cost saving as it detected that 5% to 13% apps were repackaged. The proposed
doesn‟t require dynamic simulation and manual efforts. But as solution cannot detect the repackaged apps if the original app is
a static based detection method it cannot detect the malwares not present in database. Also because of limited database most
which dynamically load the malicious content such as of the malwares remains undetected. Google play store may
DroidKngFu and BaseBridge. also contain malwares. The limitation of this solution also
includes that they have assumed all the Google Play apps as
Limitation of Permission Based Detection: Permission legitimate apps and then matched the signature of the apps
based detection is a quick filter for the application taken from other app store to detect the repacked apps.
scanning and identifying that whether the application is
benign or malware but it only analyses the manifest file DroidAPIMiner [44], build upon Androgaurd [39],
it do not analyze other files which contain the identifies the malware by tracking the sensitive API calls ,
malicious code. Also there is very small difference in dangerous parameters invoked and package level information
permissions used by the malicious and benign apps. within the bytecode. To classify the application as benign or
Permission based methods require second pass to malware it implements KNN algorithm [38] and detected up to
provide efficient malware detection. 99 % accuracy and 2.2% false positive rate.
3) Dalvik Bytecode Analysis: Fuchs et al. [45] presented SCandroid which analyze the
In Android, Dalvik is a register-based VM. Android apps Android application statically as they are installed and
are developed in java language, compiled in java bytecode and performs data flow analysis to checks whether the data flow
then translated to dalvik byte code. Bytecode analysis helps us through the applications is consistent or not. On the basis of
to analyze the app behavior. Control and data flow analysis data flows it declares the application as safe to be run with
detect the dangerous functionalities performed by malicious requested permissions. Authors use it as a security certification
apps. tool for Android apps.
Jinyung Kim et al. [40] developed SCANDAL, a static Many researchers worked on conversion of Dalvik
analyzer that analyze the dalvik byte code of applications and bytecode to Java bytecode and then performed static analysis
detects the privacy leakage in applications. It determines the on java code to detect the malicious behavior of the app. ded
data flow from information source to any remote server. Dalvik [46] and Dare [47] are the tools used for conversion of dalvik
bytecode contains branch, method invocation and jump bytecode into java bytecode. These tools are also useful when
instructions which alters the order of execution of code and developers don‟t distribute the java source code, in such case
obfuscates the code. During execution, the possible paths that one must analyze the source code to detect the malware
an application can take can be identified by the Bytecode through static analysis. Dexpler tool [48] converts the Dalvik
analysis. In [40] Authors have examined 90 applications from bytecode into Jimple code which is used by static analysis
Android official market and 8 malicious applications from framework named Soot [49]. It makes the Soot to read the
third party market place. They found privacy leakage in 11 Dalvik Bytecode directly and perform the static analysis
Google market applications and 8 third party market without converting Dalvik bytecode into java bytecode. Well
applications. There is a need of performance optimization known static analysis framework used by researchers is WALA
techniques to implement as SCANDAL consumes more time which perform static analysis on java bytecode to detect
and memory for analysis of application. Also it does not privacy leakage within malicious apps [50].
support the applications which use reflections for data leakage. Chin et al. [51] presented a tool named ComDroid that
In the SCANDAL authors have implemented reflection detect the communication based vulnerabilities among Android
semantics manually to detect the privacy leakage in malicious apps. They have analyzed 20 samples and detected 34
apps taken from black market. exploitable vulnerabilities among 12 applications. It uses
Karlsen et al. [41] presented the first formalization of Dedexer tool [52] to disassemble the dex files in the app. It
Dalvik Bytecode along with java reflective features. They performs the static analysis on Dalvik files, analyzes the
examined 1700 popular Android Apps to determine what permissions listed in the manifest.xml file of the app, performs
Dalvik Bytecode instructions and features are mostly used by intraprocedural analysis and examines the Intents of the apps to
the Android Apps. Such formalization helps to perform control detect the communication vulnerabilities
and data flow analysis in order to detect the malicious apps or Limitations of Dalvik Bytecode Detection: In this
to identify the sensitive API calls invoked during execution. It method analysis is performed at instruction level and
supports the dynamic dispatch and reflective features. But it
468 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
consumes more power and storage space. As the in third party developer apps. It labels the sensitive data and
android devices are resource poor so they limits this keeps track of that data and app when tainted data leaves
detection approach. moves from the device. It provides efficient tracking of
sensitive information but it do not perform control flow
B. Dynamic Approach tracking. Also it cannot track information that leaves deice and
Dynamic analysis examines the application during returns in network reply.
execution. It may miss some of the code sections that are not
executed but it can easily identify the malicious behaviors that 3) Emulation Based Detection
are not detected by static analysis methods. Although static Yan et al. [60] present Android dynamic analysis platform
analysis methods are faster to malware detection but they fail DroidScope, based on Virtual Machine Introspection. As the
against the code obfuscation and encryption malwares. antimalware detect the presence of malwares because both of
them reside in the same execution environment so the
In [53] , Egele provided a detailed overview of different malwares also can detect the presence of antimalware.
dynamic analysis methods used for discrimination between DroidScope monitors the whole operating system by staying
malware and benign apps. Dynamic analysis approach is out of the execution environment and thus have more
effective against polymorphic and metamorphic code privileges than the malware programs. It also monitors the
obfuscation techniques employed by the malwares [54] but it Dalvik semantics thus the privilege escalation attacks on kernel
requires more resources. can also be detected. It is built upon QEMU. DroidDream and
1) Anomaly Based Detection DroidKungFu [61] were detected with this technique.
Iker et al. [55] proposed CrowDroid to detect the behavior Blaising et al. [62] proposed Android Application Sandbox
of applications dynamically. Details of system calls invoked by (AASandbox) which detect the suspicious applications by
the app are collected by the Strace tool [56] and then performing both static and dynamic analysis on them. It first
crowdsourcing app, which is installed on the device, creates a extracts the .dex file into human readable form and then
log file and sends it to remote server. Log file may include the performs static analysis on application. Then it analyzes the
following information: Device information, apps installed on low level interactions with system by execution of application
device and system calls. 2-mean clustering algorithm is applied in isolated sandbox environment. Actions of application are
at server side to classify the application as malware or benign. limited to sandbox due to security policy and do not affect the
Results are stored at server database. The solution provides data on device. It uses Money tool to dynamically analyze the
deep analysis and thus require large amount of resources. The application behavior which randomly generates the user events
solution requires client app to be installed on the user‟ device like touches, clicks and gestures etc. it cannot detect the new
and may classify the legitimate app as malware if it invoke malware types.
more system calls.
V. PERFORMANCE EVALUATION & ANALYSIS
Shabtai et al. [57] proposed Andromly , a behavior based
Android malware detection system. In order to classify the In this section, we evaluate the performance of different
application as benign or malware it continuously monitor the parameters and provide a comprehensive comparison of
different features and patterns that indicate the device state different attributes. Table 2 provides the limitations of the
such as battery level, CPU consumption etc. while it is running static and dynamic approach of the malware detection. The
and then apply the machine learning algorithms to discriminate malware detection through static analysis and dynamic analysis
between malicious and Benign apps. the solution can detect is provided in Table 3 and Table 4 respectively.
continuous attacks and can notify the user about these attacks.
TABLE II. LIMITATIONS OF STATIC AND DYNAMIC APPROACHES
AntiMalDroid [58], a malware detection framework using
SVM algorithm is proposed by Zhao, can identify the Mechanism Limitations
malicious apps and their variants during execution. First it
monitors the behavior of applications and their characteristics Signature based
then it categorize these characteristics as normal and malicious Cannot detect unknown malware types.
detection
behavior. Then it puts the two types of characteristics into
May consider benign app as malicious because of
learning module and generates the signatures for the behavior Permission
very small difference between permissions
characteristics, produced by learning module. Then it store the based detection
requested by both types.
signature in database and compare it with the already existing
Static
malware and benign app signatures. It classify the app as Dalvik bytecode
More power and memory consumption.
benign if the signature matches with already existing benign detection
app‟ signatures. The solution can extend the signature database Incorrect if a benign app shows same behaviors
Anomaly
dynamically and can provide high detection rate. But it detection
e.g., invoke more API calls or consumes more
consumes more time while detection process. battery and memory.
469 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
On the basis of their working techniques we have deduced major limitations and benefits for each detection mechanism.
TABLE III. MALWARE DETECTION THROUGH STATIC ANALYSIS
Application
assessment Applications with threat Provide malware
Uses Security Distance Model to measure identification during
Tang Wei and analysis to point between 50 and 100
dangerous level due to combination of 2011 installations.
[34] extend are difficult to identify as
android
requested permissions.
malware or benign apps. Can detect unknown
security malwares
470 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
Risk
Uses security rules May declare benign app as Light weight certification
assessment of application at
Compares the security configuration of malware because mostly
and installation time.
Kirin [35] application with security rules 2009 similar permissions are
certification of
Certifies the app as malware if app fails to requested by benign and Low cost.
applications at
satisfy all the security rules. malicious apps. Block the malicious
install time. applications.
Application
data flow Analyze data flows in app.
SCanDroid Cannot be applied to Provide security at install
analysis and Make decision to classify app as benign or 2009
[43] packaged applications. time.
security malware on the basis of data flow.
certification
471 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
472 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
120
80
60
40
20
0
2012 2013 2014 2015 2016 2017 2018
Current 6.93 79.8 84.8 82.8
Increase 89.8 94.8 99.8 99.99
Decrease 82.8 80.8 78.8 76.8
Average 86.3 87.8 89.3 88.4
473 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
techniques is also provided and the benefits and limitations of 5–8, 2012.
these antimalware are deduced comprehensively. At the end, a [17] “contagio mobile: Backdoor.AndroidOS.Obad.a.” [Online]. Available:
concept of hybrid antimalware is presented which will address http://contagiominidump.blogspot.in/2013/06/backdoorandroidosobada.
html. [Accessed: 28-Oct-2015].
the limitations of existing static and dynamic approaches. In
[18] C. a Castillo, “Android Malware Past , Present , and Future,” McAfee
future, it is aimed to implement the proposed hybrid solution White Pap. Mob. Secur. Work. Gr., pp. 1–28, 2011
which will be a generic antimalware that will provide better
[19] “Android.Fakedefender.B | Symantec.” [Online]. Available:
security for Android devices by firstly statically analyzing the https://www.symantec.com/security_response/writeup.jsp?docid=2013-
Android applications on local device and then it will perform 091013-3953-99. [Accessed: 15-Dec-2015].
dynamic analysis on a remote antimalware server. This will [20] “Riskware | Internet Security Threats.” [Online]. Available:
consume very small amount of memory space on the device http://usa.kaspersky.com/internet-security-center/threats/riskware#.Vm-
and the battery consumption will also be low as all dynamic 5IUp97IU. [Accessed: 15-Dec-2015].
analysis will be performed at the remote server. [21] “Trend Micro Q2 Security Roundup Report | Androidheadlines.com.”
[Online]. Available: http://www.androidheadlines.com/2015/08/trend-
REFERENCES micro-q2-security-roundup-report.html. [Accessed: 08-Dec-2015].
[1] “Eric Schmidt: „There Are Now 1.3 Million Android Device Activations [22] “A Look at Repackaged Apps and their Effect on the Mobile Threat
Per Day.‟” [Online]. Available: http://techcrunch.com/2012/09/05/eric- Landscape.” [Online]. Available: http://blog.trendmicro.com/trendlabs-
schmidt-there-are-now-1-3-million-android-device-activations-per-day/. security-intelligence/a-look-into-repackaged-apps-and-its-role-in-the-
[Accessed: 28-Oct-2015]. mobile-threat-landscape/. [Accessed: 15-Dec-2015].
[2] “Gartner Says Annual Smartphone Sales Surpassed Sales of Feature [23] “NotCompatible Android Trojan: What You Need to Know | PCWorld.”
Phones for the First Time in 2013.” [Online]. Available: [Online]. Available:
http://www.gartner.com/newsroom/id/2665715. [Accessed: 28-Oct- http://www.pcworld.com/article/254918/notcompatible_android_trojan_
2015]. what_you_need_to_know.html. [Accessed: 15-Dec-2015].
[3] “IDC: Smartphone OS Market Share 2015, 2014, 2013, and 2012.” [24] New Threats and Countermeasures in Digital Crime and Cyber
[Online]. Available: http://www.idc.com/prodserv/smartphone-os- Terrorism. IGI Global, 2015.
market-share.jsp. [Accessed: 08-Dec-2015]. [25] A. Aiken, “Apposcopy : Semantics-Based Detection of Android
[4] “Number of available Android applications - AppBrain.” [Online]. Malware Through Static Analysis,” Fse 2014, pp. 576–587, 2014.
Available: http://www.appbrain.com/stats/number-of-android-apps. [26] P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and A. Bharmal,
[Accessed: 28-Oct-2015].
“AndroSimilar: Robust Statistical Feature Signature for Android
[5] “Android and Security - Official Google Mobile Blog.” [Online]. Malware Detection,” Proc. 6th Int. Conf. Secur. Inf. Networks, pp. 152–
Available: http://googlemobile.blogspot.in/2012/02/android-and- 159, 2013.
security.html. [Accessed: 28-Oct-2015].
[27] M. Zheng, M. Sun, and J. C. S. Lui, “DroidAnalytics : A Signature
[6] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A survey of Based Analytic System to Collect , Extract , Analyze and Associate
mobile malware in the wild,” Proc. 1st ACM Work. Secur. Priv. Android Malware,” 2013.
smartphones Mob. devices - SPSM ‟11, pp. 3 – 14, 2011.
[28] Android Permissions Demystified.” [Online]. Available:
[7] R. Fedler, J. Schütte, and M. Kulicke, “On the Effectiveness of Malware https://www.truststc.org/pubs/848.html. [Accessed: 06-Nov-2015].
Protection on Android,” p. 36, 2013.
[29] R. Sato, D. Chiba, and S. Goto, “Detecting Android Malware by
[8] “Mind the (Security) Gaps: The 1H 2015 Mobile Threat Landscape - Analyzing Manifest Files,” pp. 23–31, 2013.
Security News - Trend Micro USA.” [Online]. Available: [30] “Weka 3 - Data Mining with Open Source Machine Learning Software
http://www.trendmicro.com/vinfo/us/security/news/mobile-safety/mind- in Java.” [Online]. Available: http://www.cs.waikato.ac.nz/ml/weka/.
the-security-gaps-1h-2015-mobile-threat-landscape. [Accessed: 08-Dec- [Accessed: 16-Dec-2015].
2015].
[31] C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu, “Performance evaluation on
[9] “The Mobile Landscape Roundup: 1H 2014 - Security News - Trend permission-based detection for android malware,” Adv. Intell. Syst.
Micro USA.” [Online]. Available: Appl. - Vol. 2, vol. 21, pp. 111–120, 2013.
http://www.trendmicro.com/vinfo/us/security/news/mobile-safety/the-
mobile-landscape-roundup-1h-2014. [Accessed: 08-Dec-2015]. [32] S. Ben-david, Understanding Machine Learning : From Theory to
Algorithms. 2014.
[10] R. Raveendranath, V. Rajamani, A. J. Babu, and S. K. Datta, “Android
malware attacks and countermeasures: Current and future directions,” [33] B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, P. G. Bringas, and G.
2014 Int. Conf. Control. Instrumentation, Commun. Comput. Technol., Álvarez, “PUMA: Permission usage to detect malware in android,” Adv.
pp. 137–143, 2014. Intell. Syst. Comput., vol. 189 AISC, pp. 289–298, 2013.
[11] Y. Zhou and X. Jiang, “Dissecting Android Malware: Characterization [34] W. Shin, S. Kiyomoto, K. Fukushima, and T. Tanaka, “Towards formal
and Evolution,” 2012 IEEE Symp. Secur. Priv., no. 4, pp. 95–109, 2012. analysis of the permission-based security model for Android,” 5th Int.
Conf. Wirel. Mob. Commun. ICWMC 2009, pp. 87–92, 2009.
[12] “Security Alert: Zsone Trojan found in Android Market | Lookout
Blog.” [Online]. Available: [35] W. Tang, G. Jin, J. He, and X. Jiang, “Extending android security
https://blog.lookout.com/blog/2011/05/11/security-alert-zsone-trojan- enforcement with a security distance model,” 2011 Int. Conf. Internet
found-in-android-market/. [Accessed: 15-Dec-2015]. Technol. Appl. iTAP 2011 - Proc., 2011.
[13] L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi, “Over-the-Air [36] W. Enck, M. Ongtang, and P. McDaniel, “On lightweight mobile phone
Cross-platform Infection for Breaking mTAN-based Online Banking application certification,” Proc. 16th ACM Conf. Comput. Commun.
Authentication,” Black Hat Abu Dhabi, pp. 1–12, 2012. Secur. - CCS ‟09, pp. 235–245, 2009.
[14] “root exploits.” [Online]. Available: [37] D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu, “DroidMat:
http://www.selinuxproject.org/~jmorris/lss2011_slides/caseforseandroid. Android Malware Detection through Manifest and API Calls Tracing,”
pdf. [Accessed: 15-Dec-2015]. 2012 Seventh Asia Jt. Conf. Inf. Secur., pp. 62–69, 2012.
[15] “Trojan: Android/DroidKungFu.C Description | F-Secure Labs.” [38] L. Kozma, “k Nearest Neighbors algorithm ( kNN ),” 2008.
[Online]. Available: https://www.f-secure.com/v- [39] “androguard - Reverse engineering, Malware and goodware analysis of
descs/trojan_android_droidkungfu_c.shtml. [Accessed: 15-Dec-2015]. Android applications ... and more (ninja !) - Google Project Hosting.”
[16] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, You, Get Off of My [Online]. Available: https://code.google.com/p/androguard/. [Accessed:
Market: Detecting Malicious Apps in Official and Alternative Android 01-Dec-2015].
Markets,” Proc. 19th Annu. Netw. Distrib. Syst. Secur. Symp., no. 2, pp. [40] J. Kim, Y. Yoon, and K. Yi, “S CAN D AL : Static Analyzer for
474 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 7, No. 2, 2016
475 | P a g e
www.ijacsa.thesai.org
View publication stats