Google’s Android is the most used Operating System in mobile devices but as its popularity has increased hackers have taken advantage of the momentum to plague Google Play (Android’s Application Store) with multipurpose Malware that is capable of stealing private information and give the hacker remote control of smartphone’s features in the worst cases. This work presents an innovative methodology that helps in the process of malware detection for Android Operating System, which addresses aforementioned problem from a different perspective that even popular Anti-Malware software has left aside. It is based on the analysis of a common characteristic to all different kinds of malware: the need of network communications, so the victim device can interact with the attacker. It is important to highlight that in order to improve the security level in Android, our methodology should be considered in the process of malware detection. As main characteristic, it does not need to install additional kernel modules or to root the Android device. And finally as additional characteristic, it is as simple as can be considered for non-experienced users.
[1]
Steffen Lortz,et al.
Cassandra: Towards a Certifying App Store for Android
,
2014,
SPSM@CCS.
[2]
C. Kruegel,et al.
A Large-Scale Study of Mobile Web App Security
,
2015
.
[3]
Qu Mingcheng,et al.
Optimization Design of a Real-time Embedded Operating System Based on ISO17356
,
2013
.
[4]
Chung-Huang Yang,et al.
Design and Implementation of Live SD Acquisition Tool in Android Smart Phone
,
2011,
2011 Fifth International Conference on Genetic and Evolutionary Computing.
[5]
Yajin Zhou,et al.
Dissecting Android Malware: Characterization and Evolution
,
2012,
2012 IEEE Symposium on Security and Privacy.
[6]
Harald Baier,et al.
Rooting Android - Extending the ADB by an Auto-connecting WiFi-Accessible Service
,
2011,
NordSec.
[7]
Collin Mulliner,et al.
Android Hacker's Handbook
,
2014
.