Abstract
In the Android platform environment, various techniques to detect personal information leakage are being introduced recently but effective blocking is still long way off. The proposed scheme intends to securely protect personal information on smartphones by monitoring behaviors of various Apps. If an App violates any behavior-based rule, the proposed scheme blocks running the behaviors of the App. For this purpose, I classified the behaviors of smartphone applications and defined the behaviors to monitor. I also proposed the architecture to apply it in the Android framework and applied the proposed scheme in the Android smartphone.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detection of malicious applications on android os. In: Proceedings of the 4th International Conference on Computational Forensics, IWCF 2010, pp. 138–149 (November 2011)
Kim, S., Cho, J.I., Myeong, H.W., Lee, D.H.: A study on static analysis model of mobile application for privacy protection. Computer Science and Convergence 114, 529–540 (2012)
Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium (February 2012)
Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., Wu, K.-P.: DroidMat: Android Malware Detection through Manifest and API Calls Tracing. In: 2012 Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62–29 (August 2012)
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26 (2011)
Isohara, T., Takemori, K., Kubota, A.: Kernel-based Behavior Analysis for Android Malware Detection. In: 2011 Seventh International Conference on Computational Intelligence and Security, pp. 1011–1015 (December 2011)
Blasing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An Android Application Sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55–62 (October 2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jeong, E.S. (2014). Detecting Malicious Apps through Real-Time Behavior Monitoring for Android Phone. In: Park, J., Pan, Y., Kim, CS., Yang, Y. (eds) Future Information Technology. Lecture Notes in Electrical Engineering, vol 309. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55038-6_129
Download citation
DOI: https://doi.org/10.1007/978-3-642-55038-6_129
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55037-9
Online ISBN: 978-3-642-55038-6
eBook Packages: EngineeringEngineering (R0)