Skip to main content

Smartphone Applications, Malware and Data Theft

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 412))

Abstract

The growing popularity of smartphone devices has led to development of increasing numbers of applications which have subsequently become targets for malicious authors. Analysing applications in order to identify malicious ones is a current major concern in information security; an additional problem connected with smart-phone applications is that their many advertising libraries can lead to loss of personal information. In this paper, we relate the current methods of detecting malware on smartphone devices and discuss the problems caused by malware as well as advertising.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Moonsamy, V., Batten, L.M.: Zero permission android applications—attacks and defences. In: 3rd Applications and Technologies in Information Security, pp. 5–9. School of Information Systems, Deakin University Press, Australia (2012)

    Google Scholar 

  2. Brodeur, P.: Zero-permission android applications Part 2. Publication of Leviathan Security Group; accessed August 7, 2015, http://www.leviathansecurity.com/blog/zero-permission-android-applications-part-2/ (2012)

  3. Lineberry, A., Richardson, D.L., Wyatt, T.: These aren’t the permissions you’re looking for, 2010. https://www.defcon.org/images/defcon-18/dc-18-presentations/Lineberry/DEFCON-18-Lineberry-Not-The-Permissions-You-Are-Looking-For.pdf

  4. Pearce, P., Felt, A. P., Nunez, G., Wagner, D.: Android: privilege separation for applications and advertisers in android. In: 7th ACM Symposium on Information, Computer and Communications Security, pp. 71–72. ACM Digital Library, Arizona, USA (2012)

    Google Scholar 

  5. Moonsamy, V., Alazab, M., Batten, L.M.: Towards an understanding of the impact of advertising on data leak. Int. J. Secur. Networks, 7(3), 181–193. Inderscience Publishers, London, England (2012)

    Google Scholar 

  6. Rastogi, V., Chen, Y., Jiang, X.: DroidChameleon: Evaluating android anti-malware against transformation attacks. In: 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 329–334. ACM Digital Library, Arizona, USA (2013)

    Google Scholar 

  7. Park, Y., Lee, C. Lee, C., Lim, J., Han, S., Park, M. Cho, S.: RGBDroid: a novel response-based approach to android privilege escalation attacks. In: 5th USENIX conference on Large-Scale Exploits and Emergent Threats (LEET’12), 8 pp. Berkeley, California, USA (2012)

    Google Scholar 

  8. Peng, G., Shao, Y., Wang, T., Zhan, X., Zhang, H.: Research on android malware detection and interception based on behavior monitoring. Wuhan Univ. J. Nat. Sci. 17, 421–427 (2012)

    Article  Google Scholar 

  9. Egele, M., Scholte, T., Kirda E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2), 6. Arizona, USA (2012)

    Google Scholar 

  10. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explorations, 11(1). http://www.cs.waikato.ac.nz/ml/weka/ (2009)

    Google Scholar 

  11. TrendMicro, Repeating History. http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-repeating-history.pdf (2012)

  12. Amamra, A., Talhi, C., Robert J.-M., Hamiche, M.: Enhancing Smartphone Malware Detection Performance by Applying Machine Learning Hybrid Classifiers. In: Kim, T.-H., Ramos, C., Kim, H.-K., Kiumi, A., Mohammed, S., Ślęzak, D. (eds.) Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity, CCIS, vol. 340, pp. 131–137. Springer, Heidelberg (2012)

    Google Scholar 

  13. Zhao, M., Zhang, T., Ge, F., Yuan, Z.: RobotDroid: A lightweight malware detection framework on smartphones. J. Networks 7, 715–722 (2012)

    Google Scholar 

  14. Sahs, J., Khan, L.: A machine learning approach to android malware detection. In: Intelligence and Security Informatics Conference (EISIC), pp. 141–147. Odense, Denmark (2012)

    Google Scholar 

  15. Aung, Z., Zaw, W.: Permission-based android malware detection. Int. J. Sci. Technol. Res. 2(3), 228–234 (2013)

    Google Scholar 

  16. Kent, J.T.: Information gain and a general measure of correlation. Biometrika 70, 163–173 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  17. Amos, B., Turner, H. White, J.: Applying machine learning classifiers to dynamic Android malware detection at scale. In: Wireless Communications and Mobile Computing, pp. 1666–1671 (2013)

    Google Scholar 

  18. Alazab, M., Moonsamy, V., Batten, L. M., Tian, R., Lantz, P.: Analysis of malicious and benign Android applications. In: 32nd International Conference on Distributed Computing Systems, pp. 608–616. IEEE, Los Alamitos, California, USA (2012)

    Google Scholar 

  19. Abawajy, J., Beliakov, G., Kelarev A., Yearwood, J.: Performance evaluation of multi-tier ensemble classifiers for phishing websites. In: 3rd Applications and Technologies in Information Security, pp. 11–16. School of Information Systems, Deakin University Press, Australia (2012)

    Google Scholar 

  20. Lu, Y., Din, S., Zheng, C., Gao, B.: Using multi-feature and classifier ensembles to improve malware detection. J. CCIT 39, 57–72 (2010)

    Google Scholar 

  21. Lantz, P.: An android application sandbox for dynamic analysis. Master’s thesis, Department of Electrical and Information Technology, Lund University, Lund, Sweden (2011)

    Google Scholar 

  22. Shekhar, S., Dietz, M., Wallach, D.: Adsplit: Separating smartphone advertising from applications. In: 20th USENIX Security Symposium, pp. 553–567. USENIX, Bellevue, USA (2012)

    Google Scholar 

  23. Stevens, R., Gibler, C., Crussell, J., Erickson, J., Chen. H.: Investigating user privacy in android adlibraries. In: IEEE Mobile Security Technologies (MoST 2012), 10 pp. California, USA (2012)

    Google Scholar 

  24. Grace, M.C., Zhou, W., Jiang, X., Sadeghi A.: Unsafe exposure analysis of mobile in-app advertisements. In: 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 101–112. ACM, Arizona, USA (2012)

    Google Scholar 

  25. Moonsamy, V., Batten, L.M., Shore, M.: Can smartphone users turn off tracking service settings?’ In: MoMM, 9 pp. ACM Digital Library, Arizona, USA (2013)

    Google Scholar 

  26. Rahulamathavan, Y., Moonsamy, V., Batten, L.M., Shunliang, S., Rajarajan, M.: An analysis of tracking settings in Blackberry 10 and Windows Phone 8 Smartphones. In: ACISP 2014, LNCS vol. 8544, pp. 430–437. Springer, Heidelberg (2014)

    Google Scholar 

  27. Chong, I.-G., Jun, C.-H.: Performance of some variable selection methods when multicollinearity is present. Chemometr. Intell. Lab. Syst. 78, 103–112 (2005)

    Article  Google Scholar 

  28. Barber, B., Hamilton, H.: Parametric algorithms for mining share frequent itemsets. J. Intell. Inf. Syst. 16(3), 277–293 (2001)

    Article  MATH  Google Scholar 

  29. Christen, P.: Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection. Springer, Heidelberg (2012)

    Book  Google Scholar 

  30. Mani, I. Zhang, I.: kNN approach to unbalanced data distributions: a case study involving information extraction. In: ICML’03 Workshop on Learning from Imbalanced Data Sets, 7 pp. Washington, DC, USA (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lynn M. Batten .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Batten, L.M., Moonsamy, V., Alazab, M. (2016). Smartphone Applications, Malware and Data Theft. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics