Static analysis of executables for collaborative malware detection on android

  • Authors:
  • Aubrey-Derrick Schmidt;Rainer Bye;Hans-Gunther Schmidt;Jan Clausen;Osman Kiraz;Kamer A. Yüksel;Seyit A. Camtepe;Sahin Albayrak

  • Affiliations:
  • Technische Universität Berlin, DAI-Labor;Technische Universität Berlin, DAI-Labor;Technische Universität Berlin, DAI-Labor;Technische Universität Berlin, DAI-Labor;Sabanci University, Istanbul;Sabanci University, Istanbul;Technische Universität Berlin, DAI-Labor;Technische Universität Berlin, DAI-Labor

  • Venue:
  • ICC'09 Proceedings of the 2009 IEEE international conference on Communications
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.