Abstract
The growing popularity of smartphone devices has led to development of increasing numbers of applications which have subsequently become targets for malicious authors. Analysing applications in order to identify malicious ones is a current major concern in information security; an additional problem connected with smart-phone applications is that their many advertising libraries can lead to loss of personal information. In this paper, we relate the current methods of detecting malware on smartphone devices and discuss the problems caused by malware as well as advertising.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Moonsamy, V., Batten, L.M.: Zero permission android applications—attacks and defences. In: 3rd Applications and Technologies in Information Security, pp. 5–9. School of Information Systems, Deakin University Press, Australia (2012)
Brodeur, P.: Zero-permission android applications Part 2. Publication of Leviathan Security Group; accessed August 7, 2015, http://www.leviathansecurity.com/blog/zero-permission-android-applications-part-2/ (2012)
Lineberry, A., Richardson, D.L., Wyatt, T.: These aren’t the permissions you’re looking for, 2010. https://www.defcon.org/images/defcon-18/dc-18-presentations/Lineberry/DEFCON-18-Lineberry-Not-The-Permissions-You-Are-Looking-For.pdf
Pearce, P., Felt, A. P., Nunez, G., Wagner, D.: Android: privilege separation for applications and advertisers in android. In: 7th ACM Symposium on Information, Computer and Communications Security, pp. 71–72. ACM Digital Library, Arizona, USA (2012)
Moonsamy, V., Alazab, M., Batten, L.M.: Towards an understanding of the impact of advertising on data leak. Int. J. Secur. Networks, 7(3), 181–193. Inderscience Publishers, London, England (2012)
Rastogi, V., Chen, Y., Jiang, X.: DroidChameleon: Evaluating android anti-malware against transformation attacks. In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 329–334. ACM Digital Library, Arizona, USA (2013)
Park, Y., Lee, C. Lee, C., Lim, J., Han, S., Park, M. Cho, S.: RGBDroid: a novel response-based approach to android privilege escalation attacks. In: 5th USENIX conference on Large-Scale Exploits and Emergent Threats (LEET’12), 8 pp. Berkeley, California, USA (2012)
Peng, G., Shao, Y., Wang, T., Zhan, X., Zhang, H.: Research on android malware detection and interception based on behavior monitoring. Wuhan Univ. J. Nat. Sci. 17, 421–427 (2012)
Egele, M., Scholte, T., Kirda E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2), 6. Arizona, USA (2012)
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explorations, 11(1). http://www.cs.waikato.ac.nz/ml/weka/ (2009)
TrendMicro, Repeating History. http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-repeating-history.pdf (2012)
Amamra, A., Talhi, C., Robert J.-M., Hamiche, M.: Enhancing Smartphone Malware Detection Performance by Applying Machine Learning Hybrid Classifiers. In: Kim, T.-H., Ramos, C., Kim, H.-K., Kiumi, A., Mohammed, S., Ślęzak, D. (eds.) Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity, CCIS, vol. 340, pp. 131–137. Springer, Heidelberg (2012)
Zhao, M., Zhang, T., Ge, F., Yuan, Z.: RobotDroid: A lightweight malware detection framework on smartphones. J. Networks 7, 715–722 (2012)
Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: Intelligence and Security Informatics Conference (EISIC), pp. 141–147. Odense, Denmark (2012)
Aung, Z., Zaw, W.: Permission-based android malware detection. Int. J. Sci. Technol. Res. 2(3), 228–234 (2013)
Kent, J.T.: Information gain and a general measure of correlation. Biometrika 70, 163–173 (1983)
Amos, B., Turner, H. White, J.: Applying machine learning classifiers to dynamic Android malware detection at scale. In: Wireless Communications and Mobile Computing, pp. 1666–1671 (2013)
Alazab, M., Moonsamy, V., Batten, L. M., Tian, R., Lantz, P.: Analysis of malicious and benign Android applications. In: 32nd International Conference on Distributed Computing Systems, pp. 608–616. IEEE, Los Alamitos, California, USA (2012)
Abawajy, J., Beliakov, G., Kelarev A., Yearwood, J.: Performance evaluation of multi-tier ensemble classifiers for phishing websites. In: 3rd Applications and Technologies in Information Security, pp. 11–16. School of Information Systems, Deakin University Press, Australia (2012)
Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. J. CCIT 39, 57–72 (2010)
Lantz, P.: An android application sandbox for dynamic analysis. Master’s thesis, Department of Electrical and Information Technology, Lund University, Lund, Sweden (2011)
Shekhar, S., Dietz, M., Wallach, D.: Adsplit: Separating smartphone advertising from applications. In: 20th USENIX Security Symposium, pp. 553–567. USENIX, Bellevue, USA (2012)
Stevens, R., Gibler, C., Crussell, J., Erickson, J., Chen. H.: Investigating user privacy in android adlibraries. In: IEEE Mobile Security Technologies (MoST 2012), 10 pp. California, USA (2012)
Grace, M.C., Zhou, W., Jiang, X., Sadeghi A.: Unsafe exposure analysis of mobile in-app advertisements. In: 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 101–112. ACM, Arizona, USA (2012)
Moonsamy, V., Batten, L.M., Shore, M.: Can smartphone users turn off tracking service settings?’ In: MoMM, 9 pp. ACM Digital Library, Arizona, USA (2013)
Rahulamathavan, Y., Moonsamy, V., Batten, L.M., Shunliang, S., Rajarajan, M.: An analysis of tracking settings in Blackberry 10 and Windows Phone 8 Smartphones. In: ACISP 2014, LNCS vol. 8544, pp. 430–437. Springer, Heidelberg (2014)
Chong, I.-G., Jun, C.-H.: Performance of some variable selection methods when multicollinearity is present. Chemometr. Intell. Lab. Syst. 78, 103–112 (2005)
Barber, B., Hamilton, H.: Parametric algorithms for mining share frequent itemsets. J. Intell. Inf. Syst. 16(3), 277–293 (2001)
Christen, P.: Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection. Springer, Heidelberg (2012)
Mani, I. Zhang, I.: kNN approach to unbalanced data distributions: a case study involving information extraction. In: ICML’03 Workshop on Learning from Imbalanced Data Sets, 7 pp. Washington, DC, USA (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Batten, L.M., Moonsamy, V., Alazab, M. (2016). Smartphone Applications, Malware and Data Theft. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_2
Download citation
DOI: https://doi.org/10.1007/978-981-10-0251-9_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0250-2
Online ISBN: 978-981-10-0251-9
eBook Packages: EngineeringEngineering (R0)