HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security
Title | HyDroid: A Hybrid Approach for Generating API Call Traces from Obfuscated Android Applications for Mobile Security |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Khanmohammadi, K., Hamou-Lhadj, A. |
Conference Name | 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) |
Date Published | jul |
ISBN Number | 978-1-5386-0592-9 |
Keywords | Android (operating system), Android API, Android API call traces, Android applications, Androids, API call trace generation, APIs, application program interfaces, application services, compositionality, dynamic analysis, Humanoid robots, hybrid approach, HyDroid, Java, Malware, mobile computing, mobile security, obfuscated Android applications, program diagnostics, pubcrawl, reflection, Registers, Repackaging, resilience, Resiliency, security, security of data, security threats, source code, static analysis, Static and Dynamic Analysis of Apps |
Abstract | The growing popularity of Android applications makes them vulnerable to security threats. There exist several studies that focus on the analysis of the behaviour of Android applications to detect the repackaged and malicious ones. These techniques use a variety of features to model the application's behaviour, among which the calls to Android API, made by the application components, are shown to be the most reliable. To generate the APIs that an application calls is not an easy task. This is because most malicious applications are obfuscated and do not come with the source code. This makes the problem of identifying the API methods invoked by an application an interesting research issue. In this paper, we present HyDroid, a hybrid approach that combines static and dynamic analysis to generate API call traces from the execution of an application's services. We focus on services because they contain key characteristics that allure attackers to misuse them. We show that HyDroid can be used to extract API call trace signatures of several malware families. |
URL | http://ieeexplore.ieee.org/document/8009920/?reload=true |
DOI | 10.1109/QRS.2017.27 |
Citation Key | khanmohammadi_hydroid:_2017 |
- mobile computing
- Static and Dynamic Analysis of Apps
- static analysis
- source code
- security threats
- security of data
- security
- Resiliency
- resilience
- Repackaging
- Registers
- reflection
- pubcrawl
- program diagnostics
- obfuscated Android applications
- Mobile Security
- Android (operating system)
- malware
- Java
- HyDroid
- hybrid approach
- Humanoid robots
- dynamic analysis
- Compositionality
- application services
- application program interfaces
- APIs
- API call trace generation
- Androids
- Android applications
- Android API call traces
- Android API