The term Consumerisation of IT (CoIT) has been buzzing for a while in the IT world. However, there is also a clear need for a rigorous policing process, especially for non-regulated al-ternative marketplaces. The results show that current marketplaces are functional and rela-tively healthy. Among those mali-cious apps, our system also uncovered two zero-day mal-ware (in 40 apps): one from the official Android Market and the other from alternative marketplaces. The experiments with 204, 040 apps collected from five different Android Markets in May-June 2011 reveal 211 malicious ones: 32 from the official Android Market (0.02% infec-tion rate) and 179 from alternative marketplaces (infection rates ranging from 0.20% to 0.47%). We imple-mented both schemes in a system called DroidRanger. Then we apply a heuristics-based filtering scheme to identify certain inher-ent behaviors of unknown malicious families. To this end, we first propose a permission-based behavioral footprinting scheme to detect new sam-ples of known Android malware families. In this paper, we present a systematic study for the de-tection of malicious applications (or apps) on popular An-droid Markets.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |