Abstract
With the widespread application of Android smartphones, privacy protection plays a crucial role. Android vault application provides content hiding on personal terminals to protect user privacy. However, some vault applications do not achieve real privacy protection, and its camouflage ability can be maliciously used to hide illegal information to avoid forensics. In order to solve these two issues, behavior analysis is conducted to compare three aspects of typical vaults in the third-party market. The conclusions and recommendations were given. Support Vector Machine (SVM) was used to distinguish vault from normal applications. Extensive experiments show that SVM can achieve 93.33% classification accuracy rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
IDC Corporation: Smartphone OS Market Share [DB/OL]. IDC Corporation, USA (2020). https://www.idc.com/promo/smartphone-market-share/os
Lessard, J., Kessler, G.C.: Android forensic: simplifying cell phone examinations. Small Scale Digit. Device Forensics J. 4(1), 1–12 (2010)
Hoog, A.: Android Forensics: Investigation, Analysis and Mobile Security for Google Android. ACM, New York (2011)
Zhang, X., Baggili, I., Breitinger, F.: Breaking into the vault: privacy, security and forensic analysis of Android vault applications. Comput. Secur. 1–14 (2017)
Hou, S., Ye, Y., Song, Y., et al.: HinDroid: an intelligent Android malware detection system based on structured heterogeneous information network. In: KDD 2017, pp. 1507–1515 (2017)
Ding, Y., Dai, W., Yan, S., Zhang, Y.: Control flow-based opcode behaviour analysis for malware detection. Comput. Secur. 44(2), 65–74 (2014)
Shen, F., Del Vecchio, J., Mohaisen, A., et al.: Android malware detection using complex-flows. IEEE Trans. Mob. Comput. 18(6), 1231–1245 (2019)
Backes, M., Künnemann, R., Mohammadi, E.: Computational soundness for Dalvik bytecode. In: CCS 2016, pp. 717–730 (2016)
Fang, Z., Han, W., Li, Y.: Permission based Android security: issues and countermeasures. Comput. Secur. 43(6), 205–218 (2014)
Wang, W., Wang, X., Feng, D., et al.: Exploring permission-induced risk in Android applications for malicious application detection. IEEE Trans. Inf. Forensics Secur. 9(11), 1869–1882 (2017)
Zhang, L., Thing, V.L.L., Cheng, Y.: A scalable and extensible framework for Android malware detection and family attribution. Comput. Secur. 80, 120–133 (2019)
Li, J., Xue, D., Wu, W., et al.: Incremental learning for malware classification in small datasets. Secur. Commun. Netw. 2020 (2020)
McLaughlin, N., del Rincon, J.M., Kang, K., et al.: Deep Android malware detection. In: CODASPY 2017, pp. 301–310 (2017)
Yuan, Y., Yu, Y., Xue, Y.: DroidDetector: Android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114–123 (2016)
Kim, T.G., Kang, B.J., Rho, M., et al.: A multimodal deep learning method for Android malware detection using various features. IEEE Trans. Inf. Forensics Secur. 14(3), 773–788 (2018)
Peng, H., et al.: Using probabilistic generative models for ranking risks of Android apps. In: CCS 2012, pp. 241–252 (2012)
Badhani, S., Muttoo, S.K.: CENDroid-a cluster-ensemble classifier for detecting malicious Android applications. Comput. Secur. 85, 25–40 (2019)
Zhang, H., Xiao, X., Mercaldo, F., et al.: Classification of ransomware families with machine learning based on N-gram of opcodes. Future Gener. Comput. Syst. 90, 211–221 (2019)
Acknowledgement
This work was supported in part by the 13th Five-Year Science and Technology Research Project of the Education Department of Jilin Province under Grant No. JJKH20200794KJ, the Innovation Fund of Changchun University of Science and Technology under Grant No. XJJLG-2018-09, the fund of Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education (Jilin University) under Grant No. 93K172018K05.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xie, N., Bai, H., Sun, R., Di, X. (2020). Android Vault Application Behavior Analysis and Detection. In: Zeng, J., Jing, W., Song, X., Lu, Z. (eds) Data Science. ICPCSEE 2020. Communications in Computer and Information Science, vol 1257. Springer, Singapore. https://doi.org/10.1007/978-981-15-7981-3_31
Download citation
DOI: https://doi.org/10.1007/978-981-15-7981-3_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7980-6
Online ISBN: 978-981-15-7981-3
eBook Packages: Computer ScienceComputer Science (R0)