Mobile-sandbox: having a deeper look into android applications

  • Authors:
  • Michael Spreitzenbarth;Felix Freiling;Florian Echtler;Thomas Schreck;Johannes Hoffmann

  • Affiliations:
  • Friedrich-Alexander-University, Erlangen, Germany;Friedrich-Alexander-University, Erlangen, Germany;Siemens CERT, Munich, Germany;Siemens CERT, Munich, Germany;Ruhr-University Bochum, Bochum, Germany

  • Venue:
  • Proceedings of the 28th Annual ACM Symposium on Applied Computing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Smartphones in general and Android in particular are increasingly shifting into the focus of cybercriminals. For understanding the threat to security and privacy it is important for security researchers to analyze malicious software written for these systems. The exploding number of Android malware calls for automation in the analysis. In this paper, we present Mobile-Sandbox, a system designed to automatically analyze Android applications in two novel ways: (1) it combines static and dynamic analysis, i.e., results of static analysis are used to guide dynamic analysis and extend coverage of executed code, and (2) it uses specific techniques to log calls to native (i.e., "non-Java") APIs. We evaluated the system on more than 36,000 applications from Asian third-party mobile markets and found that 24% of all applications actually use native calls in their code.