Detecting Malicious Behavior of Android Applications
Author(s):
Dewashish Upadhyay , Rajiv Gandhi College of Engineering & Research, Nagpur; Sharvari Darbhey, Rajiv Gandhi College of Engineering & Research, Nagpur; Mitalee Munghate, Rajiv Gandhi College of Engineering & Research, Nagpur; Kalyani barapatre, Rajiv Gandhi College of Engineering & Research, Nagpur; Anjali Bondre, Rajiv Gandhi College of Engineering & Research, Nagpur
Keywords:
Android, API tracing, mobile security, mobile forensics
Abstract:
Android, is an open source platform for mobile devices and covers almost 82% of all smart phone devices in the world. This makes its security issues more prominent, especially in user privacy leakage. We developed an Application for Android-based mobile devices which will check the permissions of all the applications present on the device & simultaneously trace the API calls to detect the Malicious behavior of Android application. This tool has the capability of generating log files of API calls made by an application running on a mobile device. In addition, the dynamic monitoring feature of this application will generate an action when the highly sensitive API will be called by any malicious application. The log file may be effectively utilized in analyzing app’s behavior and intentions, which will prove to be useful in several application domains. For example, this tool may be used in developing malware detection analysis based upon the API call, identifying resource usages in different app components, developing the tool for analyzing the application’s behavior, and constructing efficient mobile anti-malware tools, etc. We proposed a twostep model which combines static and dynamic analysis approaches. During the static analysis, pre-defined permission sets are used to determine whether an application has potential risks & in dynamic analysis for those suspicious applications we use reverse engineering method to embed monitoring Smali code for those highly sensitive APIs such as sending LOCATION, SMS accessing user device ID, CONTACT, etc.
Other Details:
Manuscript Id | : | IJSTEV2I10178
|
Published in | : | Volume : 2, Issue : 10
|
Publication Date | : | 01/05/2016
|
Page(s) | : | 663-668
|
Download Article