Abstract
The perception the user has about the performances of an application could determine the success of the application in the marketplace. The research community has made many efforts to understand out how to measure the user experience of mobile applications. In this paper we apply a set of features, typically used to evaluate mobile user experience (UX), with the aim at understanding whether there are differences in terms of usability between trusted and malware mobile samples. As a side effect we evaluate whether the feature set is useful to discriminate mobile malware. The experiment suggests that malware samples exhibit a better UX than legitimate ones. Furthermore we obtain, training several classifiers from UX-based features, a precision of 0.97 in malware identification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
References
Canfora, G., Mercaldo, F., Visaggio, C.A., D’Angelo, M., Furno, A., Manganelli, C.: A case study of automating user experience-oriented performance testing on smartphones. In: Proceedings of IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST) (2013)
Dixon, B., Jiang, Y., Jaiantilal, A., Mishra, S.: Location based power analysis to detect malicious code in smartphones. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (2011)
Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (2008)
Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: Preventing Your Cellphone from Spies. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 244–264. Springer, Heidelberg (2009)
Wei, J., Juarez, E., Garrido, M., Pescador, F.: Maximizing the user experience with energy-based fair sharing in battery limited mobile systems. IEEE Trans. Consum. Electron. 59(3), 690–698 (2013)
Deryckere, T., Martens, L., De Marez, L., De Moor, K., Berte, K.: A software tool to relate technical performance to user experience in a mobile context. In: Proceedings of IEEE Sixth International Symposium on a World of Wireless, Mobile and Multimedia Networks) (2008)
Canfora, G., Mercaldo, F., Visaggio, C.A.: Mobile malware detection using op-code frequency histograms. In: Proceedings of International Conference on Security and Cryptography (SECRYPT) (2015)
Canfora, G., Mercaldo, F., Moriano, G., Visaggio, C.A.: Composition-malware: building android malware at run time. In: Proceedings of International Workshop on Security of Mobile Applications (ARES) (2015)
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38, 161–190 (2012)
Blasing, T., Schmidt, A.D., Batyuk, L., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: Proceedings of 5th International Conference on Malicious and Unwanted Software (2010)
Shabtai, A., Kanonov, U., Elovici, Y.: Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw. 83(8), 1524–1537 (2010)
Canfora, G., Mercaldo, F., Visaggio, C.A.: A classifier of malicious android applications. In: Proceedings of the 2nd International Workshop on Security of Mobile Applications (ARES) (2013)
Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. OSDI 10, 255–270 (2010)
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of NDSS 2014, Network and Distributed System Security Symposium (2014)
Spreitzenbarth, M., Ectler, F., Schreck, T., Freling, F., Hoffmann, J.: Mobilesandbox: looking deeper into android applications. In: Proceedings of SAC 2013, 28th International ACM Symposium on Applied Computing (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Mercaldo, F., Visaggio, C.A. (2015). Evaluating Mobile Malware by Extracting User Experience-Based Features. In: Abrahamsson, P., Corral, L., Oivo, M., Russo, B. (eds) Product-Focused Software Process Improvement. PROFES 2015. Lecture Notes in Computer Science(), vol 9459. Springer, Cham. https://doi.org/10.1007/978-3-319-26844-6_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-26844-6_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26843-9
Online ISBN: 978-3-319-26844-6
eBook Packages: Computer ScienceComputer Science (R0)