Skip to main content

Detecting Malicious Apps through Real-Time Behavior Monitoring for Android Phone

  • Conference paper
Future Information Technology

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 309))

  • 2204 Accesses

Abstract

In the Android platform environment, various techniques to detect personal information leakage are being introduced recently but effective blocking is still long way off. The proposed scheme intends to securely protect personal information on smartphones by monitoring behaviors of various Apps. If an App violates any behavior-based rule, the proposed scheme blocks running the behaviors of the App. For this purpose, I classified the behaviors of smartphone applications and defined the behaviors to monitor. I also proposed the architecture to apply it in the Android framework and applied the proposed scheme in the Android smartphone.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. https://play.google.com/store

  2. Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detection of malicious applications on android os. In: Proceedings of the 4th International Conference on Computational Forensics, IWCF 2010, pp. 138–149 (November 2011)

    Google Scholar 

  3. Kim, S., Cho, J.I., Myeong, H.W., Lee, D.H.: A study on static analysis model of mobile application for privacy protection. Computer Science and Convergence 114, 529–540 (2012)

    Article  Google Scholar 

  4. Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium (February 2012)

    Google Scholar 

  5. Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., Wu, K.-P.: DroidMat: Android Malware Detection through Manifest and API Calls Tracing. In: 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62–29 (August 2012)

    Google Scholar 

  6. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26 (2011)

    Google Scholar 

  7. Isohara, T., Takemori, K., Kubota, A.: Kernel-based Behavior Analysis for Android Malware Detection. In: 2011 Seventh International Conference on Computational Intelligence and Security, pp. 1011–1015 (December 2011)

    Google Scholar 

  8. Blasing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An Android Application Sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55–62 (October 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eun Su Jeong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, E.S. (2014). Detecting Malicious Apps through Real-Time Behavior Monitoring for Android Phone. In: Park, J., Pan, Y., Kim, CS., Yang, Y. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55038-6_129

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55038-6_129

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-55037-9

  • Online ISBN: 978-3-642-55038-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics