Abstract | ||
---|---|---|
In this paper we explore the problem of collecting malicious smartphone advertisements. Most smartphone app contains advertisements and also suffers from vulnerable advertisement libraries. Malicious advertisements exploit the ad library vulnerability and attack victim smartphones. Similar to the traditional honeypots, we need an effective way to capture malicious ads. In this paper, we provide our approach named AdHoneyDroid. We build a crawler to gather apps on the android marketplaces and manually collect ad libraries and their vulnerabilities. Then AdHoneyDroid executes the apps and detects malicious advertisements. In our approach, we adopt the idea of API sandbox and TaintDroid to detect the attack event. We store the malicious advertisements in a database for future analysis. Malicious ads can help security analysts have a better understanding of current mobile attacks and also disclose the attack payloads. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1145/2660267.2662395 | ACM Conference on Computer and Communications Security |
Keywords | Field | DocType |
android,attack detection,invasive software,malicious ads | Sandbox (computer security),Honeypot,World Wide Web,Internet privacy,Android (operating system),Advertising,Computer science,Computer security,Exploit,Web crawler,Payload,Vulnerability | Conference |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Dongqi Wang | 1 | 0 | 0.34 |
Shuaifu Dai | 2 | 269 | 11.66 |
Yu Ding | 3 | 30 | 3.50 |
Tongxin Li | 4 | 64 | 6.51 |
Xinhui Han | 5 | 32 | 5.79 |