Android malware analysis using application permissions

Smartphones are the most useful devices nowadays because they offer a lot of useful services besides the aspect of mobility that benefit the user even more. In addition, the most popular platform is Android, because it offers verity of thousands free applications and also because the platform is ope...

Full description

Bibliographic Details
Main Author: Hamadi, Zaid Khalid
Format: Thesis
Language:English
English
Published: 2015
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/15895/
https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=96210
Abstract Abstract here
_version_ 1855619599731523584
author Hamadi, Zaid Khalid
author_facet Hamadi, Zaid Khalid
author_sort Hamadi, Zaid Khalid
description Smartphones are the most useful devices nowadays because they offer a lot of useful services besides the aspect of mobility that benefit the user even more. In addition, the most popular platform is Android, because it offers verity of thousands free applications and also because the platform is open source. In this case anybody can develop an application and then publishing it on the store. In this research, we are aiming to analyze 400 Android application samples taken from Google’s play store, in order to determine the percentage of having the malware behavior within the collected samples. A confirmed malware dataset will be collected as well and the analysis will be done in order to derive malware patterns (permissions) and then comparing the 400 application samples with the malware derived malware patterns based upon the permissions requested. However, a certain combination of some Android user permissions could create a malware behavior such as the ability to read user contacts and the permission of using the web browser. At this point we can determine that this application has a malware behavior, which can send the user contacts to a third-party server without the knowledge of the user, but this is needed to be confirmed by analyzing the application’s source code. After doing the analysis, we will be able to propose a framework to protect the user private data that will benefit the users and the application developers to avoid designing an application that request such dangerous permissions combination if possible.
format Thesis
id utem-15895
institution Universiti Teknikal Malaysia Melaka
language English
English
publishDate 2015
record_format EPrints
record_pdf Restricted
spelling utem-158952022-04-20T10:40:24Z http://eprints.utem.edu.my/id/eprint/15895/ Android malware analysis using application permissions Hamadi, Zaid Khalid T Technology (General) TK Electrical engineering. Electronics Nuclear engineering Smartphones are the most useful devices nowadays because they offer a lot of useful services besides the aspect of mobility that benefit the user even more. In addition, the most popular platform is Android, because it offers verity of thousands free applications and also because the platform is open source. In this case anybody can develop an application and then publishing it on the store. In this research, we are aiming to analyze 400 Android application samples taken from Google’s play store, in order to determine the percentage of having the malware behavior within the collected samples. A confirmed malware dataset will be collected as well and the analysis will be done in order to derive malware patterns (permissions) and then comparing the 400 application samples with the malware derived malware patterns based upon the permissions requested. However, a certain combination of some Android user permissions could create a malware behavior such as the ability to read user contacts and the permission of using the web browser. At this point we can determine that this application has a malware behavior, which can send the user contacts to a third-party server without the knowledge of the user, but this is needed to be confirmed by analyzing the application’s source code. After doing the analysis, we will be able to propose a framework to protect the user private data that will benefit the users and the application developers to avoid designing an application that request such dangerous permissions combination if possible. 2015 Thesis NonPeerReviewed text en http://eprints.utem.edu.my/id/eprint/15895/1/ANDROID%20MALWARE%20ANALYSIS%20USING%20APPLICATION%20PERMISSIONS%20%2824%20pgs%29.pdf text en http://eprints.utem.edu.my/id/eprint/15895/2/Android%20malware%20analysis%20using%20application%20permissions.pdf Hamadi, Zaid Khalid (2015) Android malware analysis using application permissions. Masters thesis, Universiti Teknikal Malaysia Melaka. https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=96210
spellingShingle T Technology (General)
TK Electrical engineering. Electronics Nuclear engineering
Hamadi, Zaid Khalid
Android malware analysis using application permissions
thesis_level Master
title Android malware analysis using application permissions
title_full Android malware analysis using application permissions
title_fullStr Android malware analysis using application permissions
title_full_unstemmed Android malware analysis using application permissions
title_short Android malware analysis using application permissions
title_sort android malware analysis using application permissions
topic T Technology (General)
TK Electrical engineering. Electronics Nuclear engineering
url http://eprints.utem.edu.my/id/eprint/15895/
https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=96210
work_keys_str_mv AT hamadizaidkhalid androidmalwareanalysisusingapplicationpermissions