Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 116))

Abstract

Ransomware is not a Personal Computer (PC) problem anymore, but nowadays smartphones are also vulnerable to it. Various types of ransomware such as Android/Simplocker and Android/ Lockerpin attack Android OS to steal users’ personal information. In this paper, we present the evolution of Android ransomware and coin a term—RansomAnalysis—to perform the investigation of samples to analyze the AndroidManifest.xml file for the extraction of permissions. We perform a comparison between permissions gathered by ransomware and benign apps. Besides this, we analyze the topmost permissions used by Android ransomware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Netmarketshare, Operating System Market Share (2019), https://www.netmarketshare.com/operating-system-market-share.aspx?qprid=9&qpcustomb=1&qpcd=1. Accessed 5 Aug 2019

  2. R. Lipovsky, L. Stefanko, G. Branisa, The Rise of Android Ransomware (2016), https://www.welivesecurity.com/wp-content/uploads/2016/02/Rise_of_Android_Ransomware.pdf. Accessed 31 May 2019

  3. Symantec, Internet Security Threat Report (2019), https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf. Accessed 20 July2019

  4. A.P. Felt, M. Finifter, E. Chin, S. Hanna, D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (Illinois, USA, Chicago, 2011), pp. 3–14

    Google Scholar 

  5. W. Enck, M. Ongtang, P. McDaniel, On lightweight mobile phone application certification, in Proceedings of the 16th ACM Conference on Computer and Communications Security (Illinois, USA, Chicago, 2009), pp. 235–245

    Google Scholar 

  6. D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, K.-P. Wu, Droidmat: android malware detection through manifest and api calls tracing, in Seventh Asia Joint IEEE Conference on Information Security (Japan, Tokyo, 2012), pp. 62–69

    Google Scholar 

  7. D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck, C. Siemens, Drebin: effective and explainable detection of android malware in your pocket. in Network and Distributed System Security Symposium (SanDiego, CA, USA, 2014)

    Google Scholar 

  8. B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, J. Nieves, P.G. Bringas, G. Álvarez Marañón, Mama: manifest analysis for malware detection in android. Cybern. Syst. 44(6–7), 469–488 (2013)

    Google Scholar 

  9. M. Qiao, A.H. Sung, Q. Liu, Merging permission and api features for android malware detection, in International Congress on Advanced Applied Informatics (IEEE, 2016), pp. 566–571

    Google Scholar 

  10. J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, H. Ye, Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Ind. Inform. 14(7), 3216–3225 (2018)

    Article  Google Scholar 

  11. M. Diamantaris, E.P. Papadopoulos, E.P. Markatos, S. Ioannidis, J. Polakis, Reaper: real-time app analysis for augmenting the android permission system, in Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy (ACM, 2019), pp. 37–48

    Google Scholar 

  12. J. Chen, C. Wang, Z. Zhao, K. Chen, R. Du, G.-J. Ahn, Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans. Inf. Forensics Secur. 13(5), 1286–1300 (2018)

    Article  Google Scholar 

  13. K. Allix, T.F. Bissyandé, J. Klein, Y. Le Traon, Androzoo: collecting millions of android apps for the research community, in Proceedings of the 13th International Conference on Mining Software Repositories (ACM, 2016), pp. 468–471

    Google Scholar 

  14. Kali, apktool (2019), https://tools.kali.org/reverse-engineering/apktool. Accessed 12 July 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shweta Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, S., Kumar, R., Krishna, C.R. (2020). RansomAnalysis: The Evolution and Investigation of Android Ransomware. In: Dutta, M., Krishna, C., Kumar, R., Kalra, M. (eds) Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India. Lecture Notes in Networks and Systems, vol 116. Springer, Singapore. https://doi.org/10.1007/978-981-15-3020-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-3020-3_4

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-3019-7

  • Online ISBN: 978-981-15-3020-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics