A3: Automatic Analysis of Android Malware
- DOI
- 10.2991/ccis-13.2013.22How to use a DOI?
- Keywords
- Android, malware, automatic anlaysis, reverse-enginnering
- Abstract
Recently, Android malware is spreading rapidly. Although static or dynamic analysis techniques for detecting Android malware can provide a comprehensive view, it is still subjected to time consuming and high cost in deployment and manual efforts. In this paper, we propose A3, an Automatic Analysis of Android malware, to detect Android malware automatically. Unlike traditional reverse-engineering methods, A3 looks for Command & Control (C&C) Server), monitors the sensitive API invoking, and declares Intent-filter automatically. Then it constructs the relationship graph of the function calls and key contexts or paths for detecting Android malware. The experimental results show that A3 can do an effective automatic analysis for Android malware and has a good performance.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Zhang Luoshi AU - Niu Yan AU - Wu Xiao AU - Wang Zhaoguo AU - Xue Yibo PY - 2013/11 DA - 2013/11 TI - A3: Automatic Analysis of Android Malware BT - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security PB - Atlantis Press SP - 89 EP - 93 SN - 1951-6851 UR - https://doi.org/10.2991/ccis-13.2013.22 DO - 10.2991/ccis-13.2013.22 ID - Luoshi2013/11 ER -