Android malware activation strategies comparison for dynamic detection

Date

2019

Authors

Vitoria Pascual, Alberto

Publisher

Acceso abierto / Sarbide irekia
Trabajo Fin de Grado / Gradu Amaierako Lana

Project identifier

Abstract

Dynamic malware detection is performed by monitoring system parameters at runtime (i.e., behavior of applications is monitored as they run on the system). To collect data necessary for the development of such detection methods, applications need to be run in a controlled environment and malware need to be properly triggered. Some methods are totally random (i.e., the exerciser creates a predefined number of events), while some others are based on GUI models (i.e., generated events are generated by using a library of different user interfaces). Goal of this project is to compare different methods for exercising applications, with the purpose of verifying that there is a significant difference between the methods. The project was performed by using already available malware samples and the comparison was performed by considering results obtained at USI. Results were obtained sufficient to say that there is a difference in some of the features extracted while in others is less significant.

Description

Keywords

Android, Malware, Droidbot, Dynamic detection, Linux

Department

Faculty/School

Escuela Técnica Superior de Ingenieros Industriales y de Telecomunicación / Telekomunikazio eta Industria Ingeniarien Goi Mailako Eskola Teknikoa / Università della Svizzera Italiana (Suiza)

Degree

Graduado o Graduada en Ingeniería Informática por la Universidad Pública de Navarra, Informatika Ingeniaritzako Graduatua Nafarroako Unibertsitate Publikoan

Doctorate program

item.page.cita

item.page.rights

Los documentos de Academica-e están protegidos por derechos de autor con todos los derechos reservados, a no ser que se indique lo contrario.