Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

A3: Automatic Analysis of Android Malware

Authors
Zhang Luoshi, Niu Yan, Wu Xiao, Wang Zhaoguo, Xue Yibo
Corresponding Author
Zhang Luoshi
Available Online November 2013.
DOI
10.2991/ccis-13.2013.22How to use a DOI?
Keywords
Android, malware, automatic anlaysis, reverse-enginnering
Abstract

Recently, Android malware is spreading rapidly. Although static or dynamic analysis techniques for detecting Android malware can provide a comprehensive view, it is still subjected to time consuming and high cost in deployment and manual efforts. In this paper, we propose A3, an Automatic Analysis of Android malware, to detect Android malware automatically. Unlike traditional reverse-engineering methods, A3 looks for Command & Control (C&C) Server), monitors the sensitive API invoking, and declares Intent-filter automatically. Then it constructs the relationship graph of the function calls and key contexts or paths for detecting Android malware. The experimental results show that A3 can do an effective automatic analysis for Android malware and has a good performance.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
Series
Advances in Intelligent Systems Research
Publication Date
November 2013
ISBN
978-90-78677-88-8
ISSN
1951-6851
DOI
10.2991/ccis-13.2013.22How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Zhang Luoshi
AU  - Niu Yan
AU  - Wu Xiao
AU  - Wang Zhaoguo
AU  - Xue Yibo
PY  - 2013/11
DA  - 2013/11
TI  - A3: Automatic Analysis of Android Malware
BT  - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
PB  - Atlantis Press
SP  - 89
EP  - 93
SN  - 1951-6851
UR  - https://doi.org/10.2991/ccis-13.2013.22
DO  - 10.2991/ccis-13.2013.22
ID  - Luoshi2013/11
ER  -