The threat of Android malware has increased owing to the increasing popularity of smartphones. Once an Android smartphone is infected with malware, the user suffers from various damages, such as the theft of personal information stored in the smartphones, the unintentional sending of short messages to premium-rate numbers without the user's knowledge, and the ability for the infected smartphones to be remotely operated and used for other malicious attacks. However, there are currently insufficient defense mechanisms against Android malware. This study proposes a new method to detect Android malware. The new method analyzes only manifest files that are required in Android applications. It realizes a lightweight approach for detection, and its effectiveness is experimentally confirmed by employing real samples of Android malware. The result shows that the new method can effectively detect Android malware, even when the sample is unknown.
[1]
Patrick D. McDaniel,et al.
On lightweight mobile phone application certification
,
2009,
CCS.
[2]
Danny Iland,et al.
Detecting Android Malware on Network Level
,
2011
.
[3]
Yajin Zhou,et al.
Dissecting Android Malware: Characterization and Evolution
,
2012,
2012 IEEE Symposium on Security and Privacy.
[4]
Hahn-Ming Lee,et al.
DroidMat: Android Malware Detection through Manifest and API Calls Tracing
,
2012,
2012 Seventh Asia Joint Conference on Information Security.