Capturing Android Malware Behaviour using System Flow Graph

Radoniaina Andriatsimandefitra 1 Valérie Viet Triem Tong 1
1 CIDRE - Confidentialité, Intégrité, Disponibilité et Répartition
IRISA-D1 - SYSTÈMES LARGE ÉCHELLE, Inria Rennes – Bretagne Atlantique , CentraleSupélec
Abstract : This article uses a new data structure namely System Flow Graph (SFG) that offers a compact representation of information dis- semination induced by an execution of an application to characterize malicious application behavior and lead some experiments on 4 malware families DroidKungFu1, DroidKungFu2, jSMSHider, BadNews. We show how SFG are relevant to exhibit malware behavior.
Document type :
Conference papers
Complete list of metadatas

Cited literature [15 references]  Display  Hide  Download

https://hal.inria.fr/hal-01018611
Contributor : Radoniaina Andriatsimandefitra <>
Submitted on : Wednesday, November 25, 2015 - 3:24:36 AM
Last modification on : Thursday, February 7, 2019 - 4:52:54 PM
Long-term archiving on : Saturday, April 29, 2017 - 12:14:57 AM

File

main.pdf
Files produced by the author(s)

Identifiers

  • HAL Id : hal-01018611, version 1

Citation

Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong. Capturing Android Malware Behaviour using System Flow Graph. NSS 2014 - The 8th International Conference on Network and System Security, Oct 2014, Xi'an, China. ⟨hal-01018611⟩

Share

Metrics

Record views

1103

Files downloads

398