We use cookies to improve your experience with our site.
Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon. On Locating Malicious Code in Piggybacked Android Apps[J]. Journal of Computer Science and Technology, 2017, 32(6): 1108-1124. DOI: 10.1007/s11390-017-1786-z
Citation: Li Li, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, Yves Le Traon. On Locating Malicious Code in Piggybacked Android Apps[J]. Journal of Computer Science and Technology, 2017, 32(6): 1108-1124. DOI: 10.1007/s11390-017-1786-z

On Locating Malicious Code in Piggybacked Android Apps

  • To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious packages based on the way malware behaviour code is triggered. With experiments on a ground truth of piggybacked apps, we are able to automatically locate the malicious packages from piggybacked Android apps with an accuracy@5 of 83.6% for such packages that are triggered through method invocations and an accuracy@5 of 82.2% for such packages that are triggered independently.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return