Filters








193 Hits in 3.0 sec

Towards Automated Android App Collusion Detection [article]

Irina Mariuca Asavoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh
2016 arXiv   pre-print
In this paper we provide a concise definition of collusion and report on a number of automated detection approaches, developed in co-operation with Intel Security.  ...  Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011.  ...  This paper contributes towards a practical automated system for collusion detection. We give a definition of collusion in Section 2.  ... 
arXiv:1603.02308v1 fatcat:mie7nrhsszgf7hyxlpogmlbjzm

Towards a threat assessment framework for apps collusion

Harsha Kumara Kalutarage, Hoang Nga Nguyen, Siraj Ahmed Shaikh
2017 Telecommunications Systems  
This paper presents a technique for quantifying the collusion threat, essentially the first step towards assessing the collusion risk.  ...  The proposed method is useful in finding the collusion candidate of interest which is critical given the high volume of Android apps available.  ...  This paper contributes towards a practical automated threat intelligence system for app collusion.  ... 
doi:10.1007/s11235-017-0296-1 pmid:32009772 pmcid:PMC6961490 fatcat:irfq73sn7zadlcg3f2xvhith74

Review of Works Content Analyzer for Information Leakage Detection and Prevention in Android Smart Devices

T. Okebule, Afe Babalola University, Ado-Ekiti, Nigeria, Oluwaseyi A. Adeyemo, K. A. Olatunji, A. S. Awe, Afe Babalola University, Ado-Ekiti, Nigeria
2022 ABUAD International Journal of Natural and Applied Sciences  
This study presents a literature review of works on content Analyzers for information leakage detection and prevention on android-based devices.  ...  The review will help to combine different concept to minimize false positives that will in turn lead to increase in code coverage towards detecting the maximum number of data leaks.  ...  Asavoae et al. (2016) presented an approach towards Automated Android App Collusion Detection.  ... 
doi:10.53982/aijnas.2022.0201.02-j fatcat:xltm3eyeczcibl37m52l5v23za

Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case [chapter]

Irina Măriuca Asăvoae, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh
2017 Data Analytics and Decision Support for Cybersecurity  
The aspiration set out in this chapter is to build a fully automated and effective collusion detection system, and tool performance will be central to address scale.  ...  To this end we present our conceptual work on the topic of collusion and discuss a number of automated tools arising from it.  ... 
doi:10.1007/978-3-319-59439-2_3 fatcat:fd6dz47f7bbtpm5nz4bdu6q5ou

Android inter-app communication threats and detection techniques

Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti
2017 Computers & security  
To the best of our knowledge this is the first survey on app collusion and state-of-the-art detection tools in Android.  ...  Despite of all the security mechanisms provided by Android, apps can carry out malicious actions through collusion. In collusion malicious functionality is divided across multiple apps.  ...  Towards Automated Android App Collusion Detection [70] Objective: The paper mentioned that collusion can cause information theft, money theft or service misuse.  ... 
doi:10.1016/j.cose.2017.07.002 fatcat:owzn5l7bvrcitix4mlfiabdhee

Designing Threat Detection Model for Emerging Software Platform

2021 International Journal of Advanced Trends in Computer Science and Engineering  
The undertaken study reveals the emergent software, their security challenges, features of Internet of Things and Android platforms, to detect the venerable and dangerous interactions between applications  ...  It focuses on the security of Internet of Things and Android Platforms.  ...  in Android apps [13, 14] .  ... 
doi:10.30534/ijatcse/2021/1281032021 fatcat:6w64wrf2bjfkxmsbywjmcqgbgy

Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption

Marco Autili, Ivano Malavolta, Alexander Perucci, Gian Luca Scoccia, Roberto Verdecchia
2021 Journal of Internet Services and Applications  
Static analysis is gaining a growing interest, allowing developers to predict properties about the run-time behavior of mobile apps without executing them.  ...  we present a systematic mapping study aimed at identifying, evaluating and classifying characteristics, trends and potential for industrial adoption of existing research in static analysis of mobile apps  ...  We established the need for performing a review on static analysis of mobile app (Section 3), we identified the main research questions (Section 4.1), and we defined the protocol to be followed by the  ... 
doi:10.1186/s13174-021-00134-x fatcat:mlzjbkdi7fhezisn3tcv7wzlbi

COVERT: Compositional Analysis of Android Inter-App Permission Leakage

Hamid Bagheri, Alireza Sadeghi, Joshua Garcia, Sam Malek
2015 IEEE Transactions on Software Engineering  
In this paper, we present COVERT, a tool for compositional analysis of Android inter-app vulnerabilities.  ...  Android is the most popular platform for mobile devices. It facilitates sharing of data and services among applications using a rich inter-app communication system.  ...  Vulnerabilities due to the interaction of multiple apps, such as collusion attacks and privilege escalation chaining [5] , cannot be detected by techniques that analyze a single app in isolation.  ... 
doi:10.1109/tse.2015.2419611 fatcat:7r76unj3vfdxdb2hkx3hcimx7e

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem.  ...  We organize the most recent security research on the Android platform into two categories: the software stack and the ecosystem.  ...  We postpone the discussion on Android app automation tools to Section 8.4.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

A Survey of Malware Risk Detection Techniques in Cloud

Ahmad Faiz Ghazali Et.al
2021 Turkish Journal of Computer and Mathematics Education  
The findings indicate the current malware detection techniques are not enough to effectively detect and protect the cloud environments.  ...  Therefore, this article presents a survey of malware risk detection techniques in cloud. The survey was conducted on publications from Scopus from the last 5 years.  ...  Android apps Argued to enable creation of 5,000 different colluding and non-colluding app sets.  ... 
doi:10.17762/turcomat.v12i3.797 fatcat:b64pm4nrcvbddm7xkc2hdvbyeq

Android Mobile Malware Detection Using Machine Learning: A Systematic Review

Janaka Senanayake, Harsha Kalutarage, Mhd Omar Al-Kadri
2021 Electronics  
This paper provides a systematic review of ML-based Android malware detection techniques.  ...  Finally, the ML-based methods for detecting source code vulnerabilities are discussed, because it might be more difficult to add security after the app is deployed.  ...  It is a must to detect malicious inter-app communication and app permissions for app collusion detection [23, 24] .  ... 
doi:10.3390/electronics10131606 fatcat:jpbsq7j6p5dtrpzkincfi2obpe

Towards a generic framework for automating extensive analysis of Android applications

Li Li, Daoyuan Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon
2016 Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC '16  
Despite much effort in the community, the momentum of Android research has not yet produced complete tools to perform thorough analysis on Android apps, leaving users vulnerable to malicious apps.  ...  We evaluate Apkpler with two plugins, demonstrating the feasibility of our approach and showing that Apkpler can indeed be leveraged to reduce the analysis complexity of Android apps.  ...  For example, We are interested in integrating ApkCombiner [8] into our framework, in favor of existing analyzers to prevent collusion attacks among multiple Android apps. Detection of conflicts.  ... 
doi:10.1145/2851613.2851784 dblp:conf/sac/0029LBBKT16 fatcat:hlk2ck5bhvhqfocw5uh42w52ti

Privacy Assessment in Android Apps: A Systematic Mapping Study

Jose M. Del Alamo, Danny Guaman, Belen Balmori, Ana Diez
2021 Electronics  
Android apps are daily installed by billions of users worldwide, who grant access to an extensive set of sensitive personal data.  ...  apps.  ...  from real app stores.  ... 
doi:10.3390/electronics10161999 fatcat:umsubxe6qjetnnem4hgaeh22ce

Blackmarket-Driven Collusion on Online Media: A Survey

Hridoy Sankar Dutta, Tanmoy Chakraborty
2021 ACM/IMS Transactions on Data Science  
We believe that collusive entity detection is a newly emerging topic in anomaly detection and cyber-security research in general, and the current survey will provide readers with an easy-to-access and  ...  comprehensive list of methods, tools, and resources proposed so far for detecting and analyzing collusive entities on online media.  ...  [10] developed a fully automated and effective detection system to detect colluding Android apps that violate the permissions causing data leaks or distributing malware over multiple apps.  ... 
doi:10.1145/3517931 fatcat:7fvgujegh5hohdiemsok6kzviq

Towards Finding Code Snippets on a Question and Answer Website Causing Mobile App Vulnerabilities

Hiroki NAKANO, Fumihiro KANEI, Yuta TAKATA, Mitsuaki AKIYAMA, Katsunari YOSHIOKA
2018 IEICE transactions on information and systems  
Android app developers sometimes copy code snippets posted on a question-and-answer (Q&A) website and use them in their apps.  ...  Despite this, the effect of such vulnerable snippets on the Android apps has not been investigated in depth.  ...  Code Clone Detection Various studies [17] - [20] have been reported on code clone detection in Android apps. Hanna et al.  ... 
doi:10.1587/transinf.2017icp0009 fatcat:3kxsypmlajdczpij3i5rnew4gu
« Previous Showing results 1 — 15 out of 193 results