"Do you want to install an update of this application?" A rigorous analysis of updated Android applications


Aysan A. I., Sen S.

2nd International Conference on Cyber Security and Cloud Computing (CS Cloud), New York, Amerika Birleşik Devletleri, 3 - 05 Kasım 2015, ss.181-186 identifier identifier

  • Yayın Türü: Bildiri / Tam Metin Bildiri
  • Cilt numarası:
  • Doi Numarası: 10.1109/cscloud.2015.97
  • Basıldığı Şehir: New York
  • Basıldığı Ülke: Amerika Birleşik Devletleri
  • Sayfa Sayıları: ss.181-186
  • Hacettepe Üniversitesi Adresli: Evet

Özet

Attackers have been searching for security vulnerabilities in Android applications to exploit. One of these security vulnerabilities is that Android applications could load codes at runtime. This helps attackers to avoid being detected by static analysis tools. In this study, we have done a rigorous analysis to see how attackers employ updating techniques in order to exploit this vulnerability, and to assess the security risks of applications using these techniques in the markets. A comprehensive analysis is carried out on nearly 30,000 applications collected from three different Android markets and two malware datasets. Both static and dynamic analysis techniques are employed to monitor malicious activities in such applications. As a result, we found 70 new malicious applications from Google Play. Our work is the first study which monitors updating behaviours of applications during their execution. This analysis allows us to analyse suspicious applications deeply and to develop better security solutions.