Dissecting Android Malware: Characterization and Evolution
The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light of their rapid growth, there is a pressing need to develop effective solutions. However, our defense capability is largely constrained by the...
Saved in:
| Published in: | 2012 IEEE Symposium on Security and Privacy pp. 95 - 109 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.05.2012
|
| Subjects: | |
| ISBN: | 9781467312448, 1467312444 |
| ISSN: | 1081-6011 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light of their rapid growth, there is a pressing need to develop effective solutions. However, our defense capability is largely constrained by the limited understanding of these emerging mobile malware and the lack of timely access to related samples. In this paper, we focus on the Android platform and aim to systematize or characterize existing Android malware. Particularly, with more than one year effort, we have managed to collect more than 1,200 malware samples that cover the majority of existing Android malware families, ranging from their debut in August 2010 to recent ones in October 2011. In addition, we systematically characterize them from various aspects, including their installation methods, activation mechanisms as well as the nature of carried malicious payloads. The characterization and a subsequent evolution-based study of representative families reveal that they are evolving rapidly to circumvent the detection from existing mobile anti-virus software. Based on the evaluation with four representative mobile security software, our experiments show that the best case detects 79.6% of them while the worst case detects only 20.2% in our dataset. These results clearly call for the need to better develop next-generation anti-mobile-malware solutions. |
|---|---|
| AbstractList | The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light of their rapid growth, there is a pressing need to develop effective solutions. However, our defense capability is largely constrained by the limited understanding of these emerging mobile malware and the lack of timely access to related samples. In this paper, we focus on the Android platform and aim to systematize or characterize existing Android malware. Particularly, with more than one year effort, we have managed to collect more than 1,200 malware samples that cover the majority of existing Android malware families, ranging from their debut in August 2010 to recent ones in October 2011. In addition, we systematically characterize them from various aspects, including their installation methods, activation mechanisms as well as the nature of carried malicious payloads. The characterization and a subsequent evolution-based study of representative families reveal that they are evolving rapidly to circumvent the detection from existing mobile anti-virus software. Based on the evaluation with four representative mobile security software, our experiments show that the best case detects 79.6% of them while the worst case detects only 20.2% in our dataset. These results clearly call for the need to better develop next-generation anti-mobile-malware solutions. |
| Author | Jiang, Xuxian Zhou, Yajin |
| Author_xml | – sequence: 1 givenname: Yajin surname: Zhou fullname: Zhou, Yajin email: yajin_zhou@ncsu.edu – sequence: 2 givenname: Xuxian surname: Jiang fullname: Jiang, Xuxian email: jiang@cs.ncsu.edu |
| BookMark | eNotjctOwzAURI0oEqVkw5ZNfiDB13aune6qUB5SEUjAurrYDhgFBzkBBF9PeMzmzNnMHLBZ7KNn7Ah4CcDrk9ubUnAQJeAOy2ptuMa6UmiA7_46KNQShFJmxubADRTIAfZZNgzPfIrWFfBqzpanYRi8HUN8zFfRpT64_Iq6D0p-mTdPlMiOPoUvGkMfc4ouX7_33duPHbK9lrrBZ_9csPuz9V1zUWyuzy-b1aYIQsE4_UprlXBoCESNVmr0Rltnpmo9yEqjJNBoWmdaDcKRrB4koLDcSNFauWDHf7vBe799TeGF0ucWhVSKa_kNgmFKRA |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/SP.2012.16 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9780769546810 0769546811 |
| EndPage | 109 |
| ExternalDocumentID | 6234407 |
| Genre | orig-research |
| GroupedDBID | 23M 29O 6IE 6IF 6IH 6IL 6IN AAJGR AAWTH ABLEC ACGFS ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP M43 OCL RIE RIL RIO RNS |
| ID | FETCH-LOGICAL-i241t-603cc42d68a1296c376e87cd86c3ce135763a1768fd8f712da35b3162c0832fc3 |
| IEDL.DBID | RIE |
| ISBN | 9781467312448 1467312444 |
| ISICitedReferencesCount | 1225 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000309219900007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1081-6011 |
| IngestDate | Wed Aug 27 01:58:25 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i241t-603cc42d68a1296c376e87cd86c3ce135763a1768fd8f712da35b3162c0832fc3 |
| PageCount | 15 |
| ParticipantIDs | ieee_primary_6234407 |
| PublicationCentury | 2000 |
| PublicationDate | 2012-05 |
| PublicationDateYYYYMMDD | 2012-05-01 |
| PublicationDate_xml | – month: 05 year: 2012 text: 2012-05 |
| PublicationDecade | 2010 |
| PublicationTitle | 2012 IEEE Symposium on Security and Privacy |
| PublicationTitleAbbrev | sp |
| PublicationYear | 2012 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000775105 ssib015833018 ssj0020394 |
| Score | 2.4828246 |
| Snippet | The popularity and adoption of smart phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. In light... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 95 |
| SubjectTerms | Android malware Malware Mobile communication Operating systems Payloads Security Smart phones smartphone security |
| Title | Dissecting Android Malware: Characterization and Evolution |
| URI | https://ieeexplore.ieee.org/document/6234407 |
| WOSCitedRecordID | wos000309219900007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV07T8MwELZKxcBUoEW85YGRtPEjttO1UDFAVYmHulWO7UiVUIpKW_4-Z8cNDCxsTibnbN93F993H0I3ihqIol0BSQ4RCecFT3Km88QqaywAhCmCJMvbo5xM1GyWT1votuHCOOdC8Znr-2G4y7dLs_G_ygYA1Zx76vielKLmau32DvHsoTT62eCFpfSxQ5N8pSyIIhKAwASSEBJIXkIyj2981_spPqvYx5Sk-eB56uu_aN8Lov_SXwnwM-78b-KHqPfD48PTBqGOUMtVx6izE3LA8Vx30fDO38obXwGNfYXjcmHxk37_0is3xKOmpXPN2MS6svh-G7dsD72O719GD0kUVUgWANZr-HZmDKdWKA1QLww4GKckrAsMjSMM8g-mCSQhpVWlJNRqlhWMCGogWKOlYSeoXS0rd4pwJv3pL6jICsl1milbhpSkzKTNFXVnqOtNMf-o-2bMoxXO_359gQ68oetiwkvUXq827grtm-168bm6Dov9DQhboAk |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PT8IwFG4ImugJFYy_7cGjg_XH1o4rSjACIRENN9K1XUJihkHAf9_XbkwPXrx1O3Wv7fveW9_3PoTuJNUQRdsUkhwSB5ynPEiYSgIjjTYAEDr1kixvQzEey9ksmdTQfcWFsdb64jPbdkN_l2-WeuN-lXUAqjl31PG9iHMaFmyt3e4hjj8Ulp7W-2EhXPRQpV8h87KIBEAwgDSEeJpXLJhDOL7r_lQ-y7KTKQmTzsvEVYDRtpNE_6XA4gGo3_jf1I9Q64fJhycVRh2jms1PUGMn5YDLk91E3Qd3L69dDTR2NY7LhcEj9f6lVraLe1VT54KziVVu8OO23LQt9Np_nPYGQSmrECwArtfw7UxrTk0sFYB9rMHFWClgZWCoLWGQgTBFIA3JjMwEoUaxKGUkphrCNZppdorq-TK3ZwhHwp3_lMZRKrgKI2kyn5RkkTCJpPYcNZ0p5h9F54x5aYWLv1_fooPBdDScD5_Gz5fo0Bm9KC28QvX1amOv0b7erhefqxu_8N-WcKNQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+IEEE+Symposium+on+Security+and+Privacy&rft.atitle=Dissecting+Android+Malware%3A+Characterization+and+Evolution&rft.au=Zhou%2C+Yajin&rft.au=Jiang%2C+Xuxian&rft.date=2012-05-01&rft.pub=IEEE&rft.isbn=9781467312448&rft.issn=1081-6011&rft.spage=95&rft.epage=109&rft_id=info:doi/10.1109%2FSP.2012.16&rft.externalDocID=6234407 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1081-6011&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1081-6011&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1081-6011&client=summon |

