Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack
|
|
|
- Alfred Floyd
- 10 years ago
- Views:
Transcription
1 , pp Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack You Joung Ham 1, Daeyeol Moon 1, Hyung-Woo Lee 1, Jae Deok Lim 2 and Jeong Nyeo Kim 2 1 Dept. of Computer Engineering, Hanshin University, 411, Yangsan-dong, Osan, Gyyeonggi, , Rep. of Korea 2 Cyber Security-Convergence Research Laboratory, ETRI, 218, Gajeongno, Yuseonggu, Daejeon, , Rep. of Korea [email protected] Abstract Due to the openness of the Android-based open market, the distribution of malicious applications developed by attackers is increasing rapidly. In order to reduce the damage caused by the malicious applications, the mechanism that allows more accurate way to determine normal apps and malicious apps for common mobile devices should be developed. In this paper, the normal system call event patterns were analyzed from the most highly used game app in the Android open market, and the malicious system call event patterns were also analyzed from the malicious game apps extracted from 1260 malware samples distributed by Android MalGenome Project. Using the Strace tool, system call events are aggregated from normal and malicious apps. And analysis of relevance to each event set was performed. Through this process of analyzing the system call events, we can extract a similarity to determine whether any given app is malicious or not. Keywords: Android, System call events, Similarity analysis, Mobile Application, Malicious App., Event pattern 1. Introduction Recently various forms of apps are developed to distribute through the Android market as the common Android-based smart device users have been increasing [1]. However, the distribution of malicious apps developed by attackers as well as that of general normal apps is increasing due to the openness of the Android-based open market that allows anyone to develop and distribute [2]. Attackers insert a malware in an app and distribute it to common users through the open market or internet targeting common smart work devices equipped with the Android platform [3]. This can attempt an attack that leaks to external server where personal information is stored in smart work devices of common users, such as SMS and phone numbers, as well as the financial information [4]. As described, the security problem is growing significant in the user environment of the Android-based common smart work devices, which is recently widespread in the nation and worldwide [5]. Detection methods for attacks on mobile devices [6-9] have been proposed to reduce the damage from the distribution of malicious apps. However, a mechanism that provides more accurate ways of determining normal apps and malicious apps on common mobile devices must be developed. This paper first analyses the attack types through the recent security vulnerabilities of Android-based mobile devices, extracts events of normal apps and malicious apps, using Android-based event analysis tool, Strace [10], and analyses them to ISSN: IJSIA Copyright c 2014 SERSC
2 propose a method that analyses the characteristics of normal apps and malicious apps and the event pattern relevance. This paper aims to suggest a method to distinguish Android-based normal apps and malicious apps based on this proposed method. To describe specifically, this paper analyzed the normal event pattern of the most highly used game apps in the Android open market to find the event pattern of normal apps and malicious apps of Android platform-based mobile devices. The analysis of normal system call event characteristics first targeted the top 80 normal game apps in the game category because malicious app types disguised as normal are most often found among the apps in the game category of the official Android market, Google Play [1]. This paper also analyzed malicious event patterns from malicious apps and disguising malicious apps of game app types among the 1260 malicious samples distributed by Android MalGenome Project [11]. As described, the implemented experiments extracted normal app and malicious app events from the normal apps and malicious apps of Android-based mobile devices, using the Linux-based system call extraction tool, Strace. First, events that occur when the normal apps and malicious apps are in action were collected to perform a relevance analysis between each event set. This process of analyzing event occurrence characteristics, pattern and distribution on normal apps and malicious apps drew out the event similarity, through which the process of distinguishing malicious apps was implemented. The structure of this paper is as follows. The second chapter analyzed the recent existing Android-related security vulnerabilities. The third and fourth chapters analyzed the each event pattern of normal apps and malicious apps. The third chapter categorized normal apps, which are the analysis subjects, based on the categories and permissions and analyzed event patterns that occur when each app is in action and their relevance. The fourth chapter analyzed the operation method of main malicious apps and analyzed event patterns that occur when each app is in action and their relevance. The fifth chapter compared the event pattern characteristics of normal apps and malicious apps based on the analysis results from the third and fourth chapter, and proposed a method that can distinguish whether any given app is malicious based on the event similarity, and the sixth chapter presented the conclusion. 2. Vulnerability of Android Platform Malware targeting smart work devises based on the Android platform are being widely distributed through the open market [12]. The reason that the security threats targeting the Android platform are increasing is based on the fact that the Android platform provides functions that are easily accessed by allowing various forms of attacks to occur based on its open and portable features. Therefore, the security vulnerabilities of the Android platform are causing various forms of attack. And in order to solve this, user-centric active diagnosis for the vulnerabilities and security mechanisms that prevents leakage of personal information are needed. As in Figure 1, attackers hide a malware inside a mobile app that appears normal in order to distribute it to smart work devices of common users. Users execute the app that includes the malware by processes such as clicking a button, and leakage of personal information saved in the smart work device can occur in this process. When the malware is executed, the attacker wins illegal access to the resource inside the device without user knowing. 232 Copyright c 2014 SERSC
3 Attack Scenario (Embeded) General Application Attack by malicious Code (backgound) Distribution Attacker Login Click Event Implicit Malicious Code Execution Figure 1. Attack Executed by Implicit Malicious Code What becomes a more severe problem is when a malware is downloaded and installed from a certain server while the malicious app distributed by an attacker is started, which will not be detected by common basic mobile vaccines. Attack Scenario (Download) General Application Attack by malicious Code (backgound) Distribution Attacker Request (background) Login Click Event C&C Server Malicious Code Execution Response (background) Malocious Code Figure 2. Attack Executed by Installation of Downloaded Malicious Code Inside Normal Application For example, an attacker can attempt a roundabout connection through SMS and others in order to induce users to download additional malwares from C&C server. Distribution of malware in the Android platform takes various methods other than this, and the inner code of disguised malicious apps is as shown in Figure 3. Malicious app that is disguised as an application for translating SMS received in Android-based smart work devices to a certain language can use malwares related to information collection to execute an attack that leaks the personal information such as SMS records to external C&C server. Another attack that violates personal information of user is an unauthorized leakage of user's location information. This malicious application executes the attack of leaking user's location information without the user knowing. Other malicious applications cause financial damage by executing online banking attacks while disguising as a normal mobile security application and communicating with C&C server. The attacks on online banking process available with smart work devices can cause damage such as taking user's password while disguising as a normal application. Copyright c 2014 SERSC 233
4 Figure 3. Malicious App that is Disguised as a Normal Application that Translates Received SMS to Certain Language Figure 4. Unauthorized Leakage of User's Location Information by Malicious App To fight against this, mobile vaccine programs for reducing security vulnerabilities to Android-based malicious apps have increased. 'V3 Mobile' developed by AhnLab [13] and Eastsoft's ALyac Android [14] are Android-based mobile vaccine programs that detect and block smishing attacks of malicious apps and provide a feature that detects repackaged apps. Also, Kaspersky Internet Security for Android [15] provides blocks on malwares and virus, inspection at all or preset time and filtering on calls and SMS services. BullGard Smart Mobile Security [16] provides detection and block of virus and spyware for SMS, MMS, , bluetooth and so on, and allows detection and remote control through GPS in case of loss or theft. However, as noted earlier, the need to analyze inner system call events that occur any time in the operation process of each application becomes evident in order to distinguish the normal mobile apps and the malicious available on Android-based smart work devices. Therefore this paper analyzed the event pattern that occurs in the operation of normal and malicious apps to propose a method to determine whether any given app is malicious. 3. Normal Game App System Event Pattern Analysis Malicious apps disguised as normal apps are found most often among the apps in the game category of official Android Google Play Store. Therefore, the analysis on normal system call event first targeted the top 80 normal game apps in the game category. Specifically, seven subcategories in the game category have been analyzed based on permission to classify the characteristics of system call event of normal applications. 234 Copyright c 2014 SERSC
5 3.1. Category based System Call Event Analysis Normal game apps have been analyzed by categories. System call events that occur when a normal game app is running and their characteristics have been analyzed by targeting seven subcategories within the game category Game Applications for Analysis Game category within Google Play Store has seven subcategories, among which the most highly used 80 normal game apps can be categorized as 8 subgroups. Event analysis first targeted mobile game applications that are included in the arcade category such as Maldalija for Kakao along with about 25 other applications. Event analysis then targeted applications included in the casual game category such as Everybody's Marble along with about 30 other applications, and the brain game and puzzle category that include Anipang and about 11 other applications. In addition, applications in the car race, sports game, entertainment and card game categories were targeted for normal even pattern and characteristic analysis App Event Analysis by Categories Events of normal game applications in each category have been analyzed by Strace instead of the classic method based on normal game applications in the seven categories described above. Event call counts of normal game application in the arcade category can be illustrated as Figure 5 below. The result of analysis on event distribution of 25 normal game applications in the arcade category indicated that eight events of clock_gettime, epoll_wait, futex, getpid, ioctl, mprotect, read and SYS_292 occurred relatively more often than other events. Figure 5. Normal App System Call Pattern: Arcade Event call counts of normal game application in the casual game category can be illustrated as Figure 6 below. The result analysis on event distribution of 30 normal game applications in the casual game category indicated, similar to the arcade category events, that nine events of clock_gettime, epoll_wait, futex, getpid, ioctl, mprotect, read SYS_292 and write occurred relatively more often than other events. The similar operational structures between casual game apps and arcade game apps are considered to have caused the larger occurrence of similar events. Copyright c 2014 SERSC 235
6 Figure 6. Normal App System Call Pattern: Casual Game Additionally, the result analysis on event distribution of 11 normal game applications in the brain game and puzzle category was partly similar to the two categories addressed earlier, but indicated that four events of futex, ioctl, gettimeofday and SYS_290 occurred relatively more often than other events. Especially applications in the brain game and puzzle category, unlike those in the arcade or casual game category, had gettimeofday and SYS_290 system call events. Lastly, other than the categories mentioned earlier, event call counts of normal game application in the other categories such as the car race, card game, entertainment, sports game category can be described as follows. Distribution of system call events of normal game application in car race, sports game, entertainment and card game was similar to that of other categories, mainly showing system call events of clock_gettime, epoll_wait, ioctl, getuid32 and mprotect Permission based System Call Event Analysis Many malicious apps disguising as normal apps can be found in the official Android market, Google Play Store. This chapter will categorize malicious false permissions found in these malicious apps, and analyzed the events that occur when the normal game application with each permission is running and their characteristics Permission Categorization As a result of analyzing permission of the most popular 80 game apps in the Google Play Store game category, there were about 20 authorizations that can damage the system, which can be categorized into four permission groups of System, SMS, Contact and Location. Therefore, permission authorizations were largely categorized into four groups, and the top 80 game apps were assigned to each group. The system category included Maldalija for Kakao and other 24 apps, the SMS category included Dark Hunter and other 11 apps, the contact category included I Love Coffee for Kakao and other 12 apps lastly and the location category included Cookie Run and other 7 apps App Event Analysis by Permission Events of normal game applications included in each category were analyzed based on the result of categorizing normal game application into four permission categories [17]. Event 236 Copyright c 2014 SERSC
7 call counts of normal game application in the system category can be illustrated as Figure 7 below. Figure 7. Normal App System Call Pattern: SYSTEM Normal applications included in the system category showed large counts in 10 system call events of clock_gettime, epoll_wait, futex, getpid, getuid32, ioctl, mprotect, read, SYS_292 and syscall_983042, and system related system call events such as getcwd, which is a system call event that finds recent work directory, have occurred relatively more often. However, normal applications included in the SMS category, unlike the system category analyzed earlier, did not show large occurrence of system related system events such as chmod, prctl and fysnc. This is because they showed system call events of normal game applications that have SMS related permissions. But, the SMS related system call events including recvmsg, recvfrom and send could not be found even if normal game applications have SMS related permissions, because relevant permissions were not executed while the apps were running. Normal applications included in the contact category did not show occurrence of system call events that occurred in the system and SMS game applications such as lseek, chmod, rename, chdir, getcwd, truncate and unlink. The reason is because the analysis was on system call event of normal game applications that have contact related permissions, but file related system call events such as message or system did not occur. However, the contact category also, as in the normal applications in the SMS category, did not show contact-related permissions while the apps were running, therefore, relevant system call could not be found. Normal game application included in the location category also demonstrates a distribution of system call events as those in the three permission groups, which were previously analyzed. However, the graph demonstrates that the system event calls such as close and open, which were rarely occurred in the previous three permission groups, occurred in normal game applications included in the location category. A comprehensive analysis on the category and permission based analyses is as follows Normal Game App System Event Pattern Analysis Normal game applications related to previous category-based analysis and permission based-analysis often have their own characteristics, but not all of them did. Therefore, this chapter suggests the characteristics of normal applications through a graph that represents all Copyright c 2014 SERSC 237
8 80 events of normal game applications. Event call count graph of normal game application is as follow. Figure 9 shows the event call count of 80 normal game application, which demonstrates that clock_gettime, clone, close, epoll_wait, futex, getpid, gettid, gettimeofday, getuid32, ioctl, madvise, mmap2, munmap, read, SYS_292, syscall_983042, write and writev event can occur in normal game applications. Through this, we can assume that mainly about 18 events above occur in normal applications regularly. On the other hand, events including dup, epoll_ctl, fcntl64, fstat64, getdents64, getpriority, open, pread, sigprocmask, stat64, SYS_290, chmod, flock, fsync, lseek, lstat64, nanosleep, poll, prctl, rename, rt_sigreturn, sched_yield, sigaction, SYS_281, SYS_283, unlink, truncate, getcwd, chdir, umask, fchown32 and others can be assumed to occur only in normal game apps or in malicious game apps. Figure 8. Normal Game App. System Call Event Pattern 4. Malicious Game App System Event Pattern Analysis This chapter presented an analysis of 1,260 malicious samples from Android MalGenome Project, and then categorizes malicious apps to analyze events. Finally, we suggest characteristics of malicious application events Activity based Analysis Android MalGenome Project [11] categorizes 1,260 samples of malicious apps largely by their characteristics to Malware Installation, Activation, Malicious Payloads and Permission Uses[9], and this paper analyzed Malware Installation. Malware Installation is again classified into Repacking, Update-Attack, Drive-by Download and Standalone [12, 18]. First, Repacking is a method that repacks an application, in which the malicious developer downloads an application that has been registered by online such as in Android official market, inserts a malware, which has been modified from apk or jar file, and distributes it. Disguising as a normal application, it leaks personal or financial information of users by causing damages often. Secondly, Update attack is a method that installs a malicious app when a user downloads an update. It cannot only install an app that the user don't know but also leak private information or lead to billing. Also, update attack has a self-update feature, and can be divided into four main techniques [19]. First method is through the user's update on existing 238 Copyright c 2014 SERSC
9 application. Second is a method using DEX Class Loader of Android to dynamically load compiled Android code and allowing execution of some codes of application that have not been allowed. Third is a method using Runtime of Java to dynamically load executable code that contains executable native code, or an individual file that shares a binary and is also called.so library. The last method is, like the malicious shellcode, dynamically loading mp3, a jpg, flash or pdf file that contains billing, and detecting vulnerabilities of external applications that access system libraries or file types to execute the attack. The third attack, Drive-by download, is a form of remote attack that downloads and executes a malware without the user knowing and mainly user-after-free and Heap Spraying method attack cases are found. Drive-by-download has a long patch cycle, so the relevant vulnerability is attacked before the patching, allowing leakage of user's private information. This Drive-By-Download attack also, like the update attack, is difficult to detect compared to other malicious apps. Lastly, Standalone is a type of app that runs by itself without help from any different tool. This Standalone can be divided to four main groups. First group distinguishes itself as spyware apps, and aims to be installed in a victim's smart phone. The second group appears to be normal, but contains false application that execute malicious action such as sending SMS without the user knowing or taking information that certifies the identification or the user. The third group contains application of malicious features such as intentionally sending unauthorized SMS or automatically registering to small additional services. The difference from the second group is that this group does not disguise as normal. Lastly, the fourth group contains applications that rely on route authorization to help it features. However, these applications use a route attack that makes a detour around the internal security sandbox without asking the user [20, 21] Method based Analysis Among the previous addressed four categorizations by method: Repackaging, Update Attack, Drive-by-Download and Standalone, this chapter analyzed 1260 malicious samples through Strace targeting the Update-Attack and Drive-by Download, which are relatively harder to detect, instead of Repacking and Standalone that are relatively easier to detect Update and Drive-by-Download Attack Malwares contained in the Update Attack are AnserverBot, BaseBridge, DroidKungFuUpdate and Plankton, and each contains 187, 122, 1, and 11 apk files respectively. This paper analyzed events of malicious application targeting two of these apk files contained in these malwares. Among the malicious apk contained in BaseBridge, ArtifactDataCable is as Figure 9 below. This malicious app changes the Wi-Fi option without the user knowing and when the app starts another application is additionally installed to damage by leaking SMS, personal information, call records or causing billings. Malwares included in Drive-by Download are four types of GGTraker, JiFake, Spitmo and Zitmo. This paper analyzed malicious application events targeting the apk file contained in each malware. Battery Saver, the malicious apk in GGTraker, is also as Figure 9 below. This malicious app sends the phone numbers to the remote server to send premium SMS service and blocks the message that notifies this feature. Copyright c 2014 SERSC 239
10 Figure 9. Update Attack (Left-BaseBridge) and Drive-by-Download Attack (Right- GGTracker) System Call Pattern of Update and Drive-by-Download Attack Among four malwares included in Update Attack, event call counts of 7 malicious applications can be illustrated as Figure 10 below. Figure 10. Malicious App. System Call Pattern Update Attack Analysis on event distribution targeting 7 malicious applications of Update Attack showed system call events of fchown32, fdatasync, mkdir, rmdir, statfs64 and umask which were relatively hard to be found in the earlier system call events of normal application. These system call events can create or delete directory or have features of synchronization of data in file disk, obtaining file system information, creation of file mask, therefore causing damage on user's device. Among four malwares included in Drive-by Download, event call counts of 3 malicious applications can be illustrated as Figure 11 below. Analysis on event distribution targeting 3 malicious applications of Drive-by Download showed system call events of bind, brk, connect, msgget, recv, recvfrom, select, semget, semop and setsockopt which were relatively hard to be found in the earlier system call events of Update Attack. The occurred system call 240 Copyright c 2014 SERSC
11 events features to change the size of data segments in the process, or return the identification number of message queue and read the data and message from socket. These features allow a supposition that Drive-by-Download leaks user's personal information such as SMS or financial information by executing orders from a certain external server or leads malicious application downloads by leading the user to connect to malicious URL. The next section analyzed event characteristics of 10 malicious applications analyzed in Update Attack and Drive-by Download. Figure 11. Malicious App. System Call Pattern Drive-by Download 4.3. Malicious App System Event Pattern Analysis Analysis of malicious apk contained in Update Attack and Drive-by Download addressed earlier is as follows. Figure 12 demonstrates that system call counts of clock_gettime, epoll_wait, futex, getpid, getuid32, ioctl, mprotect, read, SYS_292, write, which occurs mainly in normal application, are equally occurring. However, 17 system call events of bind, brk, connect, fchown32, fdatasync, fsync, mkdir, msgget, recv, recvfrom, rmdir, select, semget, semop, setsockopt, statfs64 and umask, which do not occur in normal application, are found in malicious applications. Any given apps could be suspected as malicious if the 17 system call events above have occurred in the application. Figure 12. Malicious App, Total System Call Pattern Copyright c 2014 SERSC 241
12 5. Comparison between Normal and Malicious App Event Patterns and Determination This chapter presents a result of comparison between normal and malicious application events based on the event analysis on normal applications and malicious in chapter three and four. The analysis used a newly suggested equation to distinguish events that occur in normal and malicious applications System Event Pattern Comparison The 80 normal game application and 10 malicious application events showed the events that occur only in malicious apps, those that occur only in normal apps and those that occur both in normal and malicious apps. This can be illustrated as Figure 13 (Left) below. This system calls event classification can be represented as a decision tree using formula as Figure 13 (Right). Figure 13. System Call Event Categorization (Left) and Decision Tree (Right) Figure 14 is a graph that sets I_value to 50, and the system call events that occurred only in malicious application were confirmed to be 18 of bind, brk, connect, fdatasync, mkdir, msgget, pwrite, recv, recvfrom, rename, rt_sigreturn, semget, semop, setsockopt, socket, statfs64, SYS_224 and SYS_248. And those that occurred only in normal application were 11 of chdir, flock, getcwd, nanosleep, poll, prctl, rt_sigreturn, sigaction, SYS_281 and SYS_283. And those occurred both in normal and malicious app were 40 including access, chmod and clock_gettime. Next section presented a result of comparison between normal and malicious system call events while knowing if they are normal or malicious, and the next chapter will present a method that can distinguish if any found app that user installed is malicious. 242 Copyright c 2014 SERSC
13 Figure 14. System Call Event Pattern Comparison 5.2. Malicious Application Distinction When a user downloaded and installed a found app, it is difficult to distinguish whether the app is malicious or not. This paper proposed a distinction method for installed apps based on permission. APK file installed in the mobile device should be analyzed in order to distinguish whether the installed app is malicious or normal by decompressing and obtaining the assembly code. Extracting application permission from AndroidManifest.xml in the decompressed folder and analyzing them based on normal permission group and malicious permission group can distinguish whether the given app is normal or malicious. Algorithm that distinguished malicious app through the similarity of permissions included in the given apps can be illustrated as below. Similarity with normal event group and malicious event group can be drawn out by installing a found app, obtaining permissions contained in the apps and extracting events using Strace. Normal event group and malicious event group can be changed everytime. This paper randomly chose 5 apps that were analyzed with 32 normal event groups and 36 malicious event group, and categorized normal and malicious app events that correspond to the normal event group and normal and malicious app events that correspond to the malicious AppNml AppMal event group. Through which, S i (Similarity to Normal) and S i (Similarity to Malicious) were drawn through this and the equation, (k-s AppNml AppMal i )*(S i *k (i=1,2,,n) provides the final result of distinguishing normal or malicious. Here, S(Similarity) ranges from 0 to 1, and k represents the weighted value. Normal event group consists of 32 events that occurred only in the previously addressed normal apps including clock_gettime, epoll_wait, getcwd and poll, and those that occurred more often in normal apps among those that occurred in both normal and malicious apps. On the other hand, malicious event group consists of 36 events including bind, pwrite, rename and unlink, and those that occur relatively more often in malicious apps among those that Copyright c 2014 SERSC 243
14 occurred in both normal and malicious apps. As the result, the normal and malicious similarity of normal apps and malicious apps based on normal event groups and malicious event groups can be illustrated as a graph in Figure 15 below. Figure 15. Normal and Malicious Similarity Calculation to Distinct Malicious Attack S ApNml i, the number of normal app events that correspond to normal event group, was confirmed to give relatively higher value in normal apps than in malicious apps. The reason is because the normal event group is a group of events that occur both in normal and malicious apps but occur more often in normal apps. On the other hand, S AppMal i, the number of malicious and normal events that correspond to the malicious event group over the number of malicious app events, gave much higher value in the malicious apps that in normal apps because the event group occurred only in malicious apps will be have a malware. Malicious app distinction similarity, obtained by a similarity calculation to make a more precise distinction on whether the events found in normal apps and those found in malicious apps are closet to malicious, can be illustrated as bellow. In order to make a more precise distinction on whether the events found in normal apps and those found in malicious apps are closer to malicious, malicious app distinction similarity can be demonstrated by a similarity equation. The paper has suggested a malicious app distinction method on a found normal or malicious apps through by giving weighted value k to 14 kinds of event with malicious features in the malicious event group, including chmod, unlink and fchown32 to find the similarity rate that can distinguish malicious app through the analyzed normal and malicious similarity, which have been analyzed so far. Malicious events that correspond more to the malicious event group occurred more than normal app events in Figure 15. Therefore, S AppMal i, to which the weighted value of k is multiplied, gives much ApNml larger value than S i does. As above, malicious app distinction similarity showed a high value for a given malicious application. Therefore this equation could be expected to show the same result when applied to a found app in another mobile environment. 6. Conclusions Android-based applications can be developed in an open-source form due to the openness of Android. Therefore, apps that contain malware and disguise as a normal app can be distributed through Android official market, internet, black markets and other distribution 244 Copyright c 2014 SERSC
15 routes. Common mobile devices based on Android platform as well as Android devices are exposed to attack attempts by malicious apps. This paper targeted top 80 game applications in the game category of Google Play Store and 1260 malicious samples distributed by Android MalGenome Project to categorize, analyzed normal and malicious app characteristics and events, and proposed an effective method for distinguishing malicious apps in Android-based common mobile device environment based on these events. First, the forms of recent Android device risks and malicious app attacks have been analyzed. Also, the characteristics of system call events that occur in normal or malicious apps have been compared and analyzed using Strace module, which can collect system call events in Android kernel. Based on the result, this paper used similarity analysis algorithm on events that occurred in normal and malicious apps in Android-based common mobile devices to propose an algorithm that can distinguish malicious apps. Use of the method proposed in this paper could analyze the characteristics of system call events that occurred when normal apps and malicious apps were in action, which could be applied to a method of distinguishing whether any given app is malicious. Also, the sequence analysis based on system call events extracted from Strace could draw out a system function that occurs both in normal and malicious apps with more frequent occurrence in malicious apps and relatively less frequent occurrence in normal apps. This confirmed the existence of system call function sequence of consistent pattern when an app is running. Future research can expand the application of the method proposed in this research to more various forms of mobile apps to increase the accuracy of malware distinction on a found app, contributing to a safer user environment for common mobile devices. Acknowledgements This research was funded by the MSIP(Ministry of Science, ICT & Future Planning), Korea in the ICT R&D Program References [1] Google Play Android Market, [2] More than 700,000 malicious Android apps wreak havoc on the web, [3] Android (operating system), [4] Uncovering Android Master Key that Makes 99% of Devices Vulnerable, [5] W. Enck, D. Octeau, P. McDaniel and S. Chaudhuri, A Study of Android Application Security, Proceedings of the 20 th USENIX Security Symposium, (2011). [6] I. Burquera, U. Zurutuza and S. Nadjm-Tehrani, Crowdroid: behavior-based malware detection system for Android, Proceedings of the 1 st ACM workshop on Security and privacy in smartphones and mobile devices, (2011), pp [7] T.-E. Wei, C.-H. Mao, A. B. Jeng, H.-M. Lee, H.-T. Wang and D.-J. Wu, Android Malware Detection via a Latent Network Behavior Analysis, IEEE 11 th International Conference on Trust, Security and Privacy in Computing and Communications, (2012). [8] D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee and K.-P. Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing, th Asia Joint Conference on Information Security, (2012). [9] Y.-J. Ham, W.-B. Choi, H.-W. Lee, J. D. Lim and J. N. Kim, Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities, nd International Conference on Computer Science and Network Technology, (2012), pp [10] strace, [11] Y. Zhou and X. Jiang, Dissecting Android Malware: Characterization and Evolution, Proceedings of the 33 rd IEEE Symposium on Security and Privacy, (2012). [12] X. Jiang and Y. Zhou, Android Malware, Springer, NY, USA, (2013). Copyright c 2014 SERSC 245
16 [13] AhnLab V3 Mobile 2.0, [14] ALYac Android, [15] Kaspersky Internet Security for Android, [16] BullGuard Smart Mobile Security, [17] M. Nauman, S. Khan and X. Zhang, Apex: Extending Android Permission Model and Enforcement with User- Defined Runtime Constraints, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, (2010). [18] A. PorterFelt, M. Finifter, E. Chin, S. Hanna and D. Wagner, A Survey of Mobile Malware in the Wild, Proceedings of the 1 st Workshop on Security and Privacy in Smartphones and Mobile Devices, (2011). [19] W. Zhou, Y. Zhou, X. Jiang and P. Ning, DroidMOSS: Detecting Repackaged Smartphone Applications in Third- Party Android Marketplaces, Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, (2012). [20] D. James, Android Game Programming For Dummies, John Wiley & Sons, Inc., Hoboken, New Jersey, USA, (2013). [21] Z. Mednieks, L. Dornin, G. Blake Meike and M. Nakamura, Programming Android, O Reilly, Sebastopol, CA, USA, (2012). 246 Copyright c 2014 SERSC
Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events
Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events You Joung Ham and Hyung-Woo Lee devices, and analyses the characteristics of malicious apps with activation pattern
Studying Security Weaknesses of Android System
, pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced
The Behavioral Analysis of Android Malware
, pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Malware Detection in Android by Network Traffic Analysis
Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University
Research on Situation and Key Issues of Smart Mobile Terminal Security
Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has
Mobile App Reputation
Mobile App Reputation A Webroot Security Intelligence Service Timur Kovalev and Darren Niller April 2013 2012 Webroot Inc. All rights reserved. Contents Rise of the Malicious App Machine... 3 Webroot App
QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing
Journal of Computational Information Systems 11: 11 (2015) 3875 3881 Available at http://www.jofcis.com QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Jingzheng
Remote Android Assistant with Global Positioning System Tracking
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets
Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets X. Su* CSE Dept Lehigh University Bethlehem, PA, USA [email protected] M. Chuah, G. Tan CSE Dept Lehigh
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Hacking your Droid ADITYA GUPTA
Hacking your Droid ADITYA GUPTA adityagupta1991 [at] gmail [dot] com facebook[dot]com/aditya1391 Twitter : @adi1391 INTRODUCTION After the recent developments in the smart phones, they are no longer used
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
Index Terms: Smart phones, Malwares, security, permission violation, malware detection, mobile devices, Android, security
Permission Based Malware Detection Approach Using Naive Bayes Classifier Technique For Android Devices. Pranay Kshirsagar, Pramod Mali, Hrishikesh Bidwe. Department Of Information Technology G. S. Moze
Android Security - Common attack vectors
Institute of Computer Science 4 Communication and Distributed Systems Rheinische Friedrich-Wilhelms-Universität Bonn, Germany Lab Course: Selected Topics in Communication Management Android Security -
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Device-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
10 best practice suggestions for common smartphone threats
10 best practice suggestions for common smartphone threats Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security Practice Executive When using your Bluetooth
ExtractingAndroidApplicationsDataforAnomalybasedMalwareDetection
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 15 Issue 5 Version 1.0 Year 2015 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
DroidTrace: A Ptrace Based Android Dynamic Analysis System with Forward Execution Capability
DroidTrace: A Ptrace Based Android Dynamic Analysis System with Forward Execution Capability Min Zheng, Mingshen Sun, John C.S. Lui The Chinese University of Hong Kong {mzheng,mssun,cslui}@cse.cuhk.edu.hk
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 3, March 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Android Application Analyzer
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume. 1, Issue 4, August 2014, PP 32-37 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Android
How To Detect An Advanced Persistent Threat Through Big Data And Network Analysis
, pp.30-36 http://dx.doi.org/10.14257/astl.2013.29.06 Detection of Advanced Persistent Threat by Analyzing the Big Data Log Jisang Kim 1, Taejin Lee, Hyung-guen Kim, Haeryong Park KISA, Information Security
Adobe Flash Player and Adobe AIR security
Adobe Flash Player and Adobe AIR security Both Adobe Flash Platform runtimes Flash Player and AIR include built-in security and privacy features to provide strong protection for your data and privacy,
Control Theoretic Adaptive Monitoring Tools for the Android Platform
Control Theoretic Adaptive Monitoring Tools for the Android Platform DAVID REYNOLDS Department of Computer Science Texas State University San Marcos, USA [email protected] MINA GUIRGUIS Department of
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones
A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones Anushree Pore, Prof. Mahip Bartere PG Student, Dept. of CSE, G H Raisoni College of Engineering, Amravati, Maharashtra,
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers
Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE
Kaspersky Endpoint Security 8 for Smartphone for Android OS
Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and
Pakhtunkhwa, Pakistan Email: 1 [email protected]
VFAST Transitions on Software Engineering http://www.vfast.org/index.php/xxx@ 2015 ISSN(e): 2309-3978, ISSN(p) 2411-6246 Volume 7, Number 02, July-August, 2015 pp. 12-17 A RESEARCH ON MOBILE APPLICATIONS
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
Popular Android Exploits
20-CS-6053 Network Security Spring, 2016 An Introduction To Popular Android Exploits and what makes them possible April, 2016 Questions Can a benign service call a dangerous service without the user knowing?
Ibrahim Yusuf Presales Engineer at Sophos [email protected]. Smartphones and BYOD: what are the risks and how do you manage them?
Ibrahim Yusuf Presales Engineer at Sophos [email protected] Smartphones and BYOD: what are the risks and how do you manage them? Tablets on the rise 2 Diverse 3 The Changing Mobile World Powerful devices
A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory
A Study on Behavior Patternize in BYOD Environment Using Bayesian Theory Dongwan Kang, Myoungsun Noh, Chaetae Im Abstract Since early days, businesses had started introducing environments for mobile device
Creating and Using Databases for Android Applications
Creating and Using Databases for Android Applications Sunguk Lee * 1 Research Institute of Industrial Science and Technology Pohang, Korea [email protected] *Correspondent Author: Sunguk Lee* ([email protected])
HIPAA Security Training Manual
HIPAA Security Training Manual The final HIPAA Security Rule for Montrose Memorial Hospital went into effect in February 2005. The Security Rule includes 3 categories of compliance; Administrative Safeguards,
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation
(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,
Malware detection methods for fixed and mobile networks
Malware detection methods for fixed and mobile networks Gavin McWilliams January 2013 [email protected] Academic Centre of Excellence in Cyber Security Research Presentation Outline Malware detection
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Introduction to Android
Introduction to Android 26 October 2015 Lecture 1 26 October 2015 SE 435: Development in the Android Environment 1 Topics for Today What is Android? Terminology and Technical Terms Ownership, Distribution,
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
A Practical Analysis of Smartphone Security*
A Practical Analysis of Smartphone Security* Woongryul Jeon 1, Jeeyeon Kim 1, Youngsook Lee 2, and Dongho Won 1,** 1 School of Information and Communication Engineering, Sungkyunkwan University, Korea
Pentesting Android Apps. Sneha Rajguru (@Sneharajguru)
Pentesting Android Apps Sneha Rajguru (@Sneharajguru) About Me Penetration Tester Web, Mobile and Infrastructure applications, Secure coding ( part time do secure code analysis), CTF challenge writer (at
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications
Virus Bulletin 2013 The Droid Knight: a silent guardian for the Android kernel, hunting for rogue smartphone malware applications Next Generation Intelligent Networks Research Center (nexgin RC) http://wwwnexginrcorg/
A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
, pp.21-30 http://dx.doi.org/10.14257/ijsia.2013.7.6.03 A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services Changsoo Lee 1, Daewon Jung 2 and Keunwang Lee 3 1 Dept.
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing A proposal to realize the provision of secure Android applications - ADMS: an application development
Mobile applications security Android OS (case study) Maciej Olewiński. Cryptographic Seminar 16.05.2012r.
Mobile applications security Android OS (case study) Maciej Olewiński Cryptographic Seminar 16.05.2012r. Presentation s schedule Mobile devices market Smartphone s domination is coming Android basics Main
Mobile Malware and Spyware: Working Through the Bugs. Detective Cindy Murphy 608-267-8824 [email protected]
Mobile Malware and Spyware: Working Through the Bugs Detective Cindy Murphy 608-267-8824 [email protected] The Mobile Malware Threat 155% increase in mobile malware from 2010 to 2011 614% increase
Pentesting Mobile Applications
WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer
How To Create A Bada App On Android 2.2.2 (Mainfest) On Android 3.5.2 And Get A Download Of Bada (For Android) On A Microsoft Gosu 2.5 (For Black
I. bada... 3 1. Developer Site : Register application development information... 3 1) Registration procedure... 3 2) Standards for managing mainfest.xml depending on status of registration for bada application
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Big Data Collection Study for Providing Efficient Information
, pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and
Certified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
... Mobile App Reputation Services THE RADICATI GROUP, INC.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Mobile App Reputation Services Understanding
Security Threats for Mobile Platforms
Security Threats for Mobile Platforms Goran Delac Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia Abstract - The proliferation of smart-phone devices, with ever advancing
Guidelines for smart phones, tablets and other mobile devices
Guidelines for smart phones, tablets and other mobile devices Summary Smart phones, tablets and other similar mobile devices are being used increasingly both privately and in organisations. Another emerging
Security Measures of Personal Information of Smart Home PC
, pp.227-236 http://dx.doi.org/10.14257/ijsh.2013.7.6.22 Security Measures of Personal Information of Smart Home PC Mi-Sook Seo 1 and Dea-Woo Park 2 1, 2 Department of Integrative Engineering, Hoseo Graduate
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Symantec's Secret Sauce for Mobile Threat Protection. Jon Dreyfus, Ellen Linardi, Matthew Yeo
Symantec's Secret Sauce for Mobile Threat Protection Jon Dreyfus, Ellen Linardi, Matthew Yeo 1 Agenda 1 2 3 4 Threat landscape and Mobile Insight overview What s unique about Mobile Insight Mobile Insight
Review of Mobile Applications Testing with Automated Techniques
Review of Mobile Testing with Automated Techniques Anureet Kaur Asst Prof, Guru Nanak Dev University, Amritsar, Punjab Abstract: As the mobile applications and mobile consumers are rising swiftly, it is
Cyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
Mobile Security Framework; Advances in Mobile Governance in Korea. TaeKyung Kim [email protected]
Mobile Security Framework; Advances in Mobile Governance in Korea TaeKyung Kim [email protected] I. e-banking in Korea 1. e-banking? BIS (Bank for International Settlements) - e-finance(electronic banking)
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
GFI Product Manual. Administration and Configuration Manual
GFI Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is"
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Development of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Design and Analysis of Mobile Learning Management System based on Web App
, pp. 417-428 http://dx.doi.org/10.14257/ijmue.2015.10.1.38 Design and Analysis of Mobile Learning Management System based on Web App Shinwon Lee Department of Computer System Engineering, Jungwon University,
