SensDroid: Analysis for Malicious Activity Risk of Android Application
- 58 Downloads
In Android, the inter-communication structure is governed by a late runtime binding message called Intent. Intents are having rich features which can detect the true nature of malware when compared to another known trait such as permissions. In this work, a framework called SensDroid is formulated that evaluates the efficiency of android intents and permissions as a differentiating trait to spot malicious apps through sensitive analysis technique. Efficiency escalation has been achieved by integrating these traits with other well-known malware detection attributes. The proposed work also uses sufficient number of samples collected from official and third-party Android app market. Multiple parameters are evaluated and compared with the existing techniques. Successful categorization of clean and malware app with high identification rate has been achieved. As a background discussion, we also give a comprehensive review of ancient android application analysis techniques, risk identification techniques, and intent analysis techniques for contemporary malicious activity.
KeywordsAndroid analysis Data leak assessment Intent analysis Permission analysis Android application clustering Security and privacy
The authors would like to thank their colleagues for many useful comments. In particular, they are grateful to Dr. Jim Lemon from Bitwrit Software, Australia for many discussions on the R programming code.
Compliance with ethical standards
Conflict of interest
The authors declare that they have no conflict of interest.
- 1.Allix, K., Bissyandé, T. F., Klein, J., & Le Traon, Y. (2016, May). Androzoo: Collecting millions of android apps for the research community. In Mining Software Repositories (MSR), 2016 IEEE/ACM 13th Working Conference on (pp. 468-471). IEEEGoogle Scholar
- 2.Arp D, Spreitzenbarth M, Hubner M, Gascon H, Rieck K, Siemens CERT (2014) DREBIN: effective and explainable detection of android malware in your pocket. NDSS 14:23–26Google Scholar
- 9.Jing Y, Ahn GJ, Doupé A, Yi JH (2016) Checking intent-based communication in android with intent space analysis. In Proc of the 11th ACM on Asia conference on computer and communications security (pp. 735-746). ACMGoogle Scholar
- 12.Liu X, Liu J, Zhu S, Wang W, Zhang X (2019) Privacy risk analysis and mitigation of analytics libraries in the android ecosystem. IEEE Trans Mob Comput. https://doi.org/10.1109/TMC.2019.2903186
- 14.Nirumand A, Zamani B, Tork Ladani B (2019) VAnDroid: a framework for vulnerability analysis of android applications using a model-driven reverse engineering technique. Software: Prac Exp 49(1):70–99Google Scholar
- 15.Onwuzurike L, Mariconti E, Andriotis P, Cristofaro ED, Ross G, Stringhini G (2019) MaMaDroid: detecting android malware by building Markov chains of behavioral models (extended version). ACM Trans Privacy Sec (TOPS) 22(2):14Google Scholar
- 20.Shrivastava G, Kumar P (2017) Privacy analysis of android applications: state-of-art and literary assessment. Scalable Comput: Prac Exp 18(3):243–252Google Scholar
- 21.Silverman BW (2018) Density estimation for statistics and data analysis. RoutledgeGoogle Scholar
- 22.Suarez-Tangil G, Dash SK, Ahmadi M, Kinder J, Giacinto G, Cavallaro L (2017) DroidSieve: fast and accurate classification of obfuscated android malware. In: Proceedings of the seventh ACM on conference on data and application security and privacy. ACM, pp 309–320Google Scholar
- 23.Thoresen HM (2017) Automated triage of samples for malware analysis (Master's thesis, NTNU).Google Scholar
- 24.Virustotal (2019). Retrieved from https://www.virustotal.com/ Seen on April 2019
- 26.Wang C, Xu Q, Lin X, Liu S (2018) Research on data mining of permissions mode for android malware detection. Clust Comput:1–14Google Scholar