As Android malware is evolving quickly, malware creators are starting to develop new kinds of threats such as remote server-side polymorphic malicious code for Android platform that are being actively generated and distributed via the official Android Markets. Remote server-side polymorphic mobile apps can’t be detected correctly as those apps contain spyware and trojans as a hidden undetectable code. Furthermore, these types of malicious apps download other malware onto infected phones using advanced deformation and transformation tricks based on an existing exploit. Therefore, we designed and implemented dynamic analysis system to detect evasive and transformative remote SSP malicious mobile apps efficiently. In particular, we proposed web based analysis and management system to validate and confirm suspicious remote server-side polymorphic malicious apps efficiently.
[1]
Hoon-Jae Lee,et al.
Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher
,
2014,
J. Inform. and Commun. Convergence Engineering.
[2]
Mohsen Guizani,et al.
Mobile application security: malware threats and defenses
,
2015,
IEEE Wireless Communications.
[3]
Haiyang Sun,et al.
A programming model and framework for comprehensive dynamic analysis on Android
,
2015,
MODULARITY.
[4]
Yajin Zhou,et al.
Detecting repackaged smartphone applications in third-party android marketplaces
,
2012,
CODASPY '12.