Title | ||
---|---|---|
Detecting Android application malicious behaviors based on the analysis of control flows and data flows. |
Abstract | ||
---|---|---|
This paper explores the problem of identifying malicious code sections in applications for the Android. A method for analyzing Android applications is proposed, based on applying of static analysis using control flow graphs and data flow graphs. The paper formally describes the dependency relationships that are used to construct graphs, and also describes an algorithm that allows to identify malicious sections of code using the received graphs. The results of an experimental evaluation of the effectiveness of the proposed method are presented, demonstrated a high probability of detecting malicious portions of the code of Android applications. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1145/3136825.3140583 | SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS |
Keywords | Field | DocType |
Information security,Google Android,mobile security,malware,application analysis,control flow,data flow,Android application,Android security,malware detection | Android security,Graph,Android (operating system),Computer science,Control flow,Static analysis,Computer network,Information security,Malware,Data flow diagram | Conference |
Citations | PageRank | References |
0 | 0.34 | 3 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Peter D. Zegzhda | 1 | 22 | 11.92 |
Dmitry P. Zegzhda | 2 | 50 | 24.58 |
Evgeny Pavlenko | 3 | 7 | 4.21 |
Andrew Dremov | 4 | 0 | 0.34 |