Abstract
Ransomware is not a Personal Computer (PC) problem anymore, but nowadays smartphones are also vulnerable to it. Various types of ransomware such as Android/Simplocker and Android/ Lockerpin attack Android OS to steal users’ personal information. In this paper, we present the evolution of Android ransomware and coin a term—RansomAnalysis—to perform the investigation of samples to analyze the AndroidManifest.xml file for the extraction of permissions. We perform a comparison between permissions gathered by ransomware and benign apps. Besides this, we analyze the topmost permissions used by Android ransomware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Netmarketshare, Operating System Market Share (2019), https://www.netmarketshare.com/operating-system-market-share.aspx?qprid=9&qpcustomb=1&qpcd=1. Accessed 5 Aug 2019
R. Lipovsky, L. Stefanko, G. Branisa, The Rise of Android Ransomware (2016), https://www.welivesecurity.com/wp-content/uploads/2016/02/Rise_of_Android_Ransomware.pdf. Accessed 31 May 2019
Symantec, Internet Security Threat Report (2019), https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf. Accessed 20 July2019
A.P. Felt, M. Finifter, E. Chin, S. Hanna, D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (Illinois, USA, Chicago, 2011), pp. 3–14
W. Enck, M. Ongtang, P. McDaniel, On lightweight mobile phone application certification, in Proceedings of the 16th ACM Conference on Computer and Communications Security (Illinois, USA, Chicago, 2009), pp. 235–245
D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, K.-P. Wu, Droidmat: android malware detection through manifest and api calls tracing, in Seventh Asia Joint IEEE Conference on Information Security (Japan, Tokyo, 2012), pp. 62–69
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck, C. Siemens, Drebin: effective and explainable detection of android malware in your pocket. in Network and Distributed System Security Symposium (SanDiego, CA, USA, 2014)
B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, J. Nieves, P.G. Bringas, G. Álvarez Marañón, Mama: manifest analysis for malware detection in android. Cybern. Syst. 44(6–7), 469–488 (2013)
M. Qiao, A.H. Sung, Q. Liu, Merging permission and api features for android malware detection, in International Congress on Advanced Applied Informatics (IEEE, 2016), pp. 566–571
J. Li, L. Sun, Q. Yan, Z. Li, W. Srisa-an, H. Ye, Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Ind. Inform. 14(7), 3216–3225 (2018)
M. Diamantaris, E.P. Papadopoulos, E.P. Markatos, S. Ioannidis, J. Polakis, Reaper: real-time app analysis for augmenting the android permission system, in Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy (ACM, 2019), pp. 37–48
J. Chen, C. Wang, Z. Zhao, K. Chen, R. Du, G.-J. Ahn, Uncovering the face of android ransomware: characterization and real-time detection. IEEE Trans. Inf. Forensics Secur. 13(5), 1286–1300 (2018)
K. Allix, T.F. Bissyandé, J. Klein, Y. Le Traon, Androzoo: collecting millions of android apps for the research community, in Proceedings of the 13th International Conference on Mining Software Repositories (ACM, 2016), pp. 468–471
Kali, apktool (2019), https://tools.kali.org/reverse-engineering/apktool. Accessed 12 July 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, S., Kumar, R., Krishna, C.R. (2020). RansomAnalysis: The Evolution and Investigation of Android Ransomware. In: Dutta, M., Krishna, C., Kumar, R., Kalra, M. (eds) Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India. Lecture Notes in Networks and Systems, vol 116. Springer, Singapore. https://doi.org/10.1007/978-981-15-3020-3_4
Download citation
DOI: https://doi.org/10.1007/978-981-15-3020-3_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3019-7
Online ISBN: 978-981-15-3020-3
eBook Packages: EngineeringEngineering (R0)