Skip to main content

Evaluating Mobile Malware by Extracting User Experience-Based Features

  • Conference paper
  • First Online:
Book cover Product-Focused Software Process Improvement (PROFES 2015)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 9459))

Abstract

The perception the user has about the performances of an application could determine the success of the application in the marketplace. The research community has made many efforts to understand out how to measure the user experience of mobile applications. In this paper we apply a set of features, typically used to evaluate mobile user experience (UX), with the aim at understanding whether there are differences in terms of usability between trusted and malware mobile samples. As a side effect we evaluate whether the feature set is useful to discriminate mobile malware. The experiment suggests that malware samples exhibit a better UX than legitimate ones. Furthermore we obtain, training several classifiers from UX-based features, a precision of 0.97 in malware identification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.iso.org/iso/catalogue_detail.htm?csnumber=52075.

  2. 2.

    http://linux.die.net/man/2/read.

  3. 3.

    http://linux.die.net/man/2/pread.

  4. 4.

    http://linux.die.net/man/2/write.

  5. 5.

    http://linux.die.net/man/2/pwrite.

  6. 6.

    http://linux.die.net/man/1/top.

  7. 7.

    https://www.freebsd.org/cgi/man.cgi?query=vmstat.

  8. 8.

    http://elinux.org/Android_Memory_Usage#procrank.

  9. 9.

    http://linuxcommand.org/man_pages/iostat1.html.

  10. 10.

    http://developer.android.com/tools/help/monitor.html.

  11. 11.

    http://developer.android.com/tools/help/adb.html.

  12. 12.

    http://www.cs.waikato.ac.nz/ml/weka/.

  13. 13.

    https://play.google.com/.

  14. 14.

    https://www.virustotal.com/.

References

  1. Canfora, G., Mercaldo, F., Visaggio, C.A., D’Angelo, M., Furno, A., Manganelli, C.: A case study of automating user experience-oriented performance testing on smartphones. In: Proceedings of IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST) (2013)

    Google Scholar 

  2. Dixon, B., Jiang, Y., Jaiantilal, A., Mishra, S.: Location based power analysis to detect malicious code in smartphones. In: Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (2011)

    Google Scholar 

  3. Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (2008)

    Google Scholar 

  4. Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: Preventing Your Cellphone from Spies. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 244–264. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  5. Wei, J., Juarez, E., Garrido, M., Pescador, F.: Maximizing the user experience with energy-based fair sharing in battery limited mobile systems. IEEE Trans. Consum. Electron. 59(3), 690–698 (2013)

    Article  Google Scholar 

  6. Deryckere, T., Martens, L., De Marez, L., De Moor, K., Berte, K.: A software tool to relate technical performance to user experience in a mobile context. In: Proceedings of IEEE Sixth International Symposium on a World of Wireless, Mobile and Multimedia Networks) (2008)

    Google Scholar 

  7. Canfora, G., Mercaldo, F., Visaggio, C.A.: Mobile malware detection using op-code frequency histograms. In: Proceedings of International Conference on Security and Cryptography (SECRYPT) (2015)

    Google Scholar 

  8. Canfora, G., Mercaldo, F., Moriano, G., Visaggio, C.A.: Composition-malware: building android malware at run time. In: Proceedings of International Workshop on Security of Mobile Applications (ARES) (2015)

    Google Scholar 

  9. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38, 161–190 (2012)

    Article  Google Scholar 

  10. Blasing, T., Schmidt, A.D., Batyuk, L., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: Proceedings of 5th International Conference on Malicious and Unwanted Software (2010)

    Google Scholar 

  11. Shabtai, A., Kanonov, U., Elovici, Y.: Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw. 83(8), 1524–1537 (2010)

    Article  Google Scholar 

  12. Canfora, G., Mercaldo, F., Visaggio, C.A.: A classifier of malicious android applications. In: Proceedings of the 2nd International Workshop on Security of Mobile Applications (ARES) (2013)

    Google Scholar 

  13. Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. OSDI 10, 255–270 (2010)

    Google Scholar 

  14. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: Drebin: effective and explainable detection of android malware in your pocket. In: Proceedings of NDSS 2014, Network and Distributed System Security Symposium (2014)

    Google Scholar 

  15. Spreitzenbarth, M., Ectler, F., Schreck, T., Freling, F., Hoffmann, J.: Mobilesandbox: looking deeper into android applications. In: Proceedings of SAC 2013, 28th International ACM Symposium on Applied Computing (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francesco Mercaldo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Mercaldo, F., Visaggio, C.A. (2015). Evaluating Mobile Malware by Extracting User Experience-Based Features. In: Abrahamsson, P., Corral, L., Oivo, M., Russo, B. (eds) Product-Focused Software Process Improvement. PROFES 2015. Lecture Notes in Computer Science(), vol 9459. Springer, Cham. https://doi.org/10.1007/978-3-319-26844-6_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26844-6_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26843-9

  • Online ISBN: 978-3-319-26844-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics