• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction


You Joung Ham, Hyung-Woo Lee, Journal of Internet Computing and Services, Vol. 14, No. 6, pp. 125-0, Dec. 2013
10.7472/jksii.2013.14.6.125, Full Text:
Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis

Abstract

Distribution of malicious applications developed by attackers is increasing along with general normal applications due to the openness of the Android-based open market. Mechanism that allows more accurate ways to distinguish normal apps and malicious apps for common mobile devices should be developed in order to reduce the damage caused by the rampant malicious applications. This paper analysed the normal event pattern from the most highly used game apps in the Android open market to analyse the event pattern from normal apps and malicious apps of mobile devices that are based on the Android platform, and analysed the malicious event pattern from the malicious apps and the disguising malicious apps in the form of a game app among 1260 malware samples distributed by Android MalGenome Project. As described, experiment that extracts normal app and malicious app events was performed using Strace, the Linux-based system call extraction tool, targeting normal apps and malicious apps on Android-based mobile devices. Relevance analysis for each event set was performed on collected events that occurred when normal apps and malicious apps were running. This paper successfully extracted event similarity through this process of analyzing the event occurrence characteristics, pattern and distribution on each set of normal apps and malicious apps, and lastly suggested a mechanism that determines whether any given app is malicious.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Ham, Y. & Lee, H. (2013). Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction. Journal of Internet Computing and Services, 14(6), 125-0. DOI: 10.7472/jksii.2013.14.6.125.

[IEEE Style]
Y. J. Ham and H. Lee, "Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction," Journal of Internet Computing and Services, vol. 14, no. 6, pp. 125-0, 2013. DOI: 10.7472/jksii.2013.14.6.125.

[ACM Style]
You Joung Ham and Hyung-Woo Lee. 2013. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction. Journal of Internet Computing and Services, 14, 6, (2013), 125-0. DOI: 10.7472/jksii.2013.14.6.125.