TY - GEN
T1 - A Hybrid Framework for Detecting Repackaged Applications on the Android Market
AU - Rizvi, Syed
AU - Alden, Kieran
AU - Campbell, Shakir
N1 - Publisher Copyright:
© 2019 IEEE.
PY - 2019/7
Y1 - 2019/7
N2 - Smartphones and tablets have become part of our daily lives. These devices run on two major competing software platforms: Apple's iOS and the Google's Android OS. The popular software design has implemented applications which are purchased by end users. Android apps are mostly purchased through the Google Play Store, while iOS apps are available on Apple's App Store. The apps exclusively have given birth to a new market as well, attracting all kinds of interested users, hackers and cybercriminals. In this paper, we focus on the Android software being more susceptible to attacks through the purchase or download of malicious apps, also known as 'repackaged apps.' These are applications containing malicious code and phishing malware that are visually similar to the original app that the end user intended to purchase. The objective of this research is twofold: Our first research goal is to analyze the three state of the art malware detection mechanisms and identify their known vulnerabilities that can be exploited by the existing threats. Our second research goal is to develop a hybrid malware detection framework by combining the strong features of the preexisting schemes. In addition, we show the practicality of our proposed framework by presenting three case studies that demonstrate how different components of our hybrid solution will work together to maximize the malicious-code detection in repackaged applications.
AB - Smartphones and tablets have become part of our daily lives. These devices run on two major competing software platforms: Apple's iOS and the Google's Android OS. The popular software design has implemented applications which are purchased by end users. Android apps are mostly purchased through the Google Play Store, while iOS apps are available on Apple's App Store. The apps exclusively have given birth to a new market as well, attracting all kinds of interested users, hackers and cybercriminals. In this paper, we focus on the Android software being more susceptible to attacks through the purchase or download of malicious apps, also known as 'repackaged apps.' These are applications containing malicious code and phishing malware that are visually similar to the original app that the end user intended to purchase. The objective of this research is twofold: Our first research goal is to analyze the three state of the art malware detection mechanisms and identify their known vulnerabilities that can be exploited by the existing threats. Our second research goal is to develop a hybrid malware detection framework by combining the strong features of the preexisting schemes. In addition, we show the practicality of our proposed framework by presenting three case studies that demonstrate how different components of our hybrid solution will work together to maximize the malicious-code detection in repackaged applications.
UR - http://www.scopus.com/inward/record.url?scp=85101101058&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85101101058&partnerID=8YFLogxK
U2 - 10.1109/ICSSA48308.2019.00017
DO - 10.1109/ICSSA48308.2019.00017
M3 - Conference contribution
AN - SCOPUS:85101101058
T3 - Proceedings - 2019 International Conference on Software Security and Assurance, ICSSA 2019
SP - 76
EP - 82
BT - Proceedings - 2019 International Conference on Software Security and Assurance, ICSSA 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 5th International Conference on Software Security and Assurance, ICSSA 2019
Y2 - 25 July 2019 through 26 July 2019
ER -