"Do you want to install an update of this application?" A rigorous analysis of updated Android applications


Aysan A. I., Sen S.

2nd International Conference on Cyber Security and Cloud Computing (CS Cloud), New York, United States Of America, 3 - 05 November 2015, pp.181-186, (Full Text) identifier identifier

  • Publication Type: Conference Paper / Full Text
  • Volume:
  • Doi Number: 10.1109/cscloud.2015.97
  • City: New York
  • Country: United States Of America
  • Page Numbers: pp.181-186
  • Hacettepe University Affiliated: Yes

Abstract

Attackers have been searching for security vulnerabilities in Android applications to exploit. One of these security vulnerabilities is that Android applications could load codes at runtime. This helps attackers to avoid being detected by static analysis tools. In this study, we have done a rigorous analysis to see how attackers employ updating techniques in order to exploit this vulnerability, and to assess the security risks of applications using these techniques in the markets. A comprehensive analysis is carried out on nearly 30,000 applications collected from three different Android markets and two malware datasets. Both static and dynamic analysis techniques are employed to monitor malicious activities in such applications. As a result, we found 70 new malicious applications from Google Play. Our work is the first study which monitors updating behaviours of applications during their execution. This analysis allows us to analyse suspicious applications deeply and to develop better security solutions.