SlideShare a Scribd company logo
Android Malware Detection
Mechanisms
Talha KABAKUŞ
talhakabakus@gmail.com
Agenda
● Android Market Share
● Malware Types
● Android Security Mechanism
● User Profiles
● Static Analysis
● Signature Based Analysis & Protection
● Encrypted Data Communication
Android Users
more than
1 billion
users
Surdar Pichai
Q4 2013
Applications
more than
1 million
applications
Hugo Barra
Temmuz 2013
Android Market Share
Source: Strategy Analytics
81.3%
Q3 2013
Why Android is so popular?
● Open source
● Google support
● Free
● Linux based
● Java
● Rich SDK
● Strong third party
community ve support
○ Sony, Motorola, HTC, Samsung
Malware Market
99%Source: CISCO 2014 Security Report
Malware Stats
Source: Sophos Labs
1 million
Malware Types
● Backdoor
○ Access to a computer system that
bypasses security mechanisms
● Exploit
○ Modifications on operating system
○ User interface modifications
● Spyware
○ Unauthorized advertising
○ Private data collection, transmission
○ Unauthorized operations (SMS, calls)
Android Security Mechanism
● Permission based
○ Accept / Reject
● Public, indefensible market
○ Everyone can upload any
application
● Passive protection - feedback based
○ Applications are removed through
negative feedbacks
User Profiles
42%
Unaware about
permissions
83%
do not interest in
permissions
Source: Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User
Attention, Comprehension, and Behavior. Proceedings of the Eighth Symposium on Usable Privacy and
Security - SOUPS ’12. p. 1 (2012).
Static Analysis Approach
● Inspection of APK files using reverse
engineering
● Manifest file
○ Permissions
○ Activities
○ Services
○ Receives
● API calls
● Source code inspection
Static Analysis Tools
● apktool
○ Extracts .apk archives
● aapt
○ Lists .apk archive contents
● dex2jar
○ Converts .dex files into .jar
● jd-gui
○ Converts .class files into Java sources
● Equality checks
● Type conversion controls
● Static updates
● Dead code detection
● Inconsistent hashCode
and equals definitions
● null pointer controls
● Termination controls
Source Code Inspection
Type Conversion Sample
<EditText android:layout_width="fill_parent"
android:layout_height="wrap_content" android:
id="@+id/username"/>
EditText editText = (EditText) findViewById(R.
id.username);
XML
Java
null pointer control sample
Java Activity Class
Layout definition
Dead Code Detection Sample
Never be executed
Unreachable
code
Signature Based Analysis & Control
● Signature database
● Smartphone client
● Central server
● Learning based
● Classification
Bening Malware
Encrypted Data Communication
● All valuable data is encrypted and stored in
SQLite database; decrypted when it is
required.
● SMS
● Email
● Sensitive files
● Password
● Personal
information Pocatilu, 2011
System Comparisons
Ability MADAM DroidMat Julia
Manifest inspection Var Var Var
API call trace Var Var Var
Signature database Var Var Yok
Encrypted communication Yok Yok Yok
Machine learning Var Var Yok
References I
● Bicheno, S.: Android Captures Record 81 Percent Share of Global Smartphone Shipments in
Q3 2013, http://blogs.strategyanalytics.com/WSS/post/2013/10/31/Android-Captures-
Record-81-Percent-Share-of-Global-Smartphone-Shipments-in-Q3-2013.aspx.
● Rowinski, D.: Google Play Hits One Million Android Apps, http://readwrite.
com/2013/07/24/google-play-hits-one-million-android-apps.
● Cisco 2014 Annual Security Report, https://www.cisco.
com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf.
● Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild.
SPSM ’11 Proceedings
● Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get Off of My Market: Detecting Malicious
Apps in Official and Alternative Android Markets. Proceedings of the 19th Annual Network
and Distributed System Security Symposium (NDSS) (2012).
● Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User
Attention, Comprehension, and Behavior. Proceedings of the Eighth Symposium on Usable
Privacy and Security - SOUPS ’12. p. 1 (2012).
● Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions.
Proceeding of the WebApps’11 Proceedings of the 2nd USENIX conference on Web
application development. p. 7. USENIX Association, Berkeley, CA, USA (2011).
● Enck, W., Ongtang, M., Mcdaniel, P.: On Lightweight Mobile Phone Application Certification.
ACM conference on Computer and communications security. pp. 235–245 (2009).
References II
● Android Architecture, http://www.tutorialspoint.
com/android/android_architecture.htm.
● Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., Wu, K.-P.: DroidMat: Android
Malware Detection through Manifest and API Calls Tracing. 2012 Seventh
Asia Joint Conference on Information Security. pp. 62–69 (2012).
● Payet, É., Spoto, F.: Static analysis of Android programs, (2012).
● Guido, M., Ondricek, J., Grover, J., Wilburn, D., Nguyen, T., Hunt, A.:
Automated identification of installed malicious Android applications. Digital
Investigation (2013).
● Dini, G., Martinelli, F., Saracino, A., Sgandurra, D.: MADAM: A Multi-level
Anomaly Detector for Android Malware. In: Kotenko, I. and Skormin, V. (eds.)
Computer Network Security. pp. 240–253. Springer Berlin Heidelberg, Berlin,
Heidelberg (2012).
● Pocatilu, P.: Android applications security. Inform. Econ. 15, 163–171.
Retrieved from http://revistaie.ase.ro (2011).
Thanks...
/talhakabakus
talhakabakus@gmail.com
talhakabakus.weebly.com

More Related Content

PDF
Malware Detection in Android Applications
PDF
Android malware presentation
PPTX
Mobile security
PDF
Malware detection-using-machine-learning
PPTX
Malware- Types, Detection and Future
PPTX
Cyber attack
PPTX
Android security
PPTX
Introduction to Cryptography
Malware Detection in Android Applications
Android malware presentation
Mobile security
Malware detection-using-machine-learning
Malware- Types, Detection and Future
Cyber attack
Android security
Introduction to Cryptography

What's hot (20)

PDF
Api security-testing
ODP
Malware Dectection Using Machine learning
PPTX
Android security
PPTX
Appium Presentation
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
cryptography
PPT
STRIDE And DREAD
PPTX
Cryptographic protocols
PPTX
Metasploit
PDF
Threat Intelligence
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
PDF
Web Application Penetration Tests - Information Gathering Stage
PDF
OWASP Mobile Top 10
PPTX
Malware Classification and Analysis
PPTX
Android Security
PPT
Port Scanning
PPTX
Introduction to penetration testing
PPTX
Threat modeling web application: a case study
PDF
Secure Code Review 101
Api security-testing
Malware Dectection Using Machine learning
Android security
Appium Presentation
Intrusion Detection Systems and Intrusion Prevention Systems
cryptography
STRIDE And DREAD
Cryptographic protocols
Metasploit
Threat Intelligence
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Web Application Penetration Tests - Information Gathering Stage
OWASP Mobile Top 10
Malware Classification and Analysis
Android Security
Port Scanning
Introduction to penetration testing
Threat modeling web application: a case study
Secure Code Review 101
Ad

Similar to Android Malware Detection Mechanisms (20)

PPTX
Malware Improvements in Android OS
PPTX
COVERT app
PDF
Android Malware Detection in Official and Third Party Application Stores
PDF
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
PDF
Reading Group Presentation: Why Eve and Mallory Love Android
PDF
Android Security: A Survey of Security Issues and Defenses
PPTX
Android security
PDF
Permission Driven Malware Detection using Machine Learning
PDF
ToorCon 14 : Malandroid : The Crux of Android Infections
PDF
Towards the methods of analysis malicious applications for Android
PDF
Android Malware Detection Literature Review
DOCX
Review of behavior malware analysis for android
PDF
Permission based malware detection by using k means algorithm in Android OS
PDF
Android Secure Coding
PPTX
I haz you and pwn your maal
PPTX
Android village @nullcon 2012
PDF
20120140504023
PDF
ANDROID MALWARE ANALYSIS : A SURVEY PAPER
PDF
ANDROID MALWARE ANALYSIS : A SURVEY PAPER
Malware Improvements in Android OS
COVERT app
Android Malware Detection in Official and Third Party Application Stores
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
Reading Group Presentation: Why Eve and Mallory Love Android
Android Security: A Survey of Security Issues and Defenses
Android security
Permission Driven Malware Detection using Machine Learning
ToorCon 14 : Malandroid : The Crux of Android Infections
Towards the methods of analysis malicious applications for Android
Android Malware Detection Literature Review
Review of behavior malware analysis for android
Permission based malware detection by using k means algorithm in Android OS
Android Secure Coding
I haz you and pwn your maal
Android village @nullcon 2012
20120140504023
ANDROID MALWARE ANALYSIS : A SURVEY PAPER
ANDROID MALWARE ANALYSIS : A SURVEY PAPER
Ad

More from Talha Kabakus (12)

PDF
Abant İzzet Baysal Üniversitesi Lisansüstü Programlara Başvuru Ön Kayit Sistemi
PDF
Web Saldırı Teknikleri & Korunma Yöntemleri
PDF
Programlanabilir DDRx Denetleyicileri
PDF
Android Kötücül Yazılım (Malware) Tespit Mekanizmaları
PDF
Abant İzzet Baysal Üniversitesi Enstitü Ön Kayıt Sistemi v.2
PDF
Abant İzzet Baysal Üniversitesi Enstitü Ön Kayıt Sistemi
PPTX
Atlassian JIRA
PDF
OSI Veri Bağı Katmanı
ODP
Google Arama Motorunda Matrislerin Önemi
PDF
Görüntü i̇şlemede makine öğrenme teknikleri
PDF
64 bit işlemcilerin modern tarihçesi
PDF
ID3 Algorithm & ROC Analysis
Abant İzzet Baysal Üniversitesi Lisansüstü Programlara Başvuru Ön Kayit Sistemi
Web Saldırı Teknikleri & Korunma Yöntemleri
Programlanabilir DDRx Denetleyicileri
Android Kötücül Yazılım (Malware) Tespit Mekanizmaları
Abant İzzet Baysal Üniversitesi Enstitü Ön Kayıt Sistemi v.2
Abant İzzet Baysal Üniversitesi Enstitü Ön Kayıt Sistemi
Atlassian JIRA
OSI Veri Bağı Katmanı
Google Arama Motorunda Matrislerin Önemi
Görüntü i̇şlemede makine öğrenme teknikleri
64 bit işlemcilerin modern tarihçesi
ID3 Algorithm & ROC Analysis

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation_ Review paper, used for researhc scholars
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Monthly Chronicles - July 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Per capita expenditure prediction using model stacking based on satellite ima...
“AI and Expert System Decision Support & Business Intelligence Systems”
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
A Presentation on Artificial Intelligence
Encapsulation_ Review paper, used for researhc scholars

Android Malware Detection Mechanisms

  • 1. Android Malware Detection Mechanisms Talha KABAKUŞ talhakabakus@gmail.com
  • 2. Agenda ● Android Market Share ● Malware Types ● Android Security Mechanism ● User Profiles ● Static Analysis ● Signature Based Analysis & Protection ● Encrypted Data Communication
  • 3. Android Users more than 1 billion users Surdar Pichai Q4 2013
  • 5. Android Market Share Source: Strategy Analytics 81.3% Q3 2013
  • 6. Why Android is so popular? ● Open source ● Google support ● Free ● Linux based ● Java ● Rich SDK ● Strong third party community ve support ○ Sony, Motorola, HTC, Samsung
  • 7. Malware Market 99%Source: CISCO 2014 Security Report
  • 9. Malware Types ● Backdoor ○ Access to a computer system that bypasses security mechanisms ● Exploit ○ Modifications on operating system ○ User interface modifications ● Spyware ○ Unauthorized advertising ○ Private data collection, transmission ○ Unauthorized operations (SMS, calls)
  • 10. Android Security Mechanism ● Permission based ○ Accept / Reject ● Public, indefensible market ○ Everyone can upload any application ● Passive protection - feedback based ○ Applications are removed through negative feedbacks
  • 11. User Profiles 42% Unaware about permissions 83% do not interest in permissions Source: Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User Attention, Comprehension, and Behavior. Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS ’12. p. 1 (2012).
  • 12. Static Analysis Approach ● Inspection of APK files using reverse engineering ● Manifest file ○ Permissions ○ Activities ○ Services ○ Receives ● API calls ● Source code inspection
  • 13. Static Analysis Tools ● apktool ○ Extracts .apk archives ● aapt ○ Lists .apk archive contents ● dex2jar ○ Converts .dex files into .jar ● jd-gui ○ Converts .class files into Java sources
  • 14. ● Equality checks ● Type conversion controls ● Static updates ● Dead code detection ● Inconsistent hashCode and equals definitions ● null pointer controls ● Termination controls Source Code Inspection
  • 15. Type Conversion Sample <EditText android:layout_width="fill_parent" android:layout_height="wrap_content" android: id="@+id/username"/> EditText editText = (EditText) findViewById(R. id.username); XML Java
  • 16. null pointer control sample Java Activity Class Layout definition
  • 17. Dead Code Detection Sample Never be executed Unreachable code
  • 18. Signature Based Analysis & Control ● Signature database ● Smartphone client ● Central server ● Learning based ● Classification Bening Malware
  • 19. Encrypted Data Communication ● All valuable data is encrypted and stored in SQLite database; decrypted when it is required. ● SMS ● Email ● Sensitive files ● Password ● Personal information Pocatilu, 2011
  • 20. System Comparisons Ability MADAM DroidMat Julia Manifest inspection Var Var Var API call trace Var Var Var Signature database Var Var Yok Encrypted communication Yok Yok Yok Machine learning Var Var Yok
  • 21. References I ● Bicheno, S.: Android Captures Record 81 Percent Share of Global Smartphone Shipments in Q3 2013, http://blogs.strategyanalytics.com/WSS/post/2013/10/31/Android-Captures- Record-81-Percent-Share-of-Global-Smartphone-Shipments-in-Q3-2013.aspx. ● Rowinski, D.: Google Play Hits One Million Android Apps, http://readwrite. com/2013/07/24/google-play-hits-one-million-android-apps. ● Cisco 2014 Annual Security Report, https://www.cisco. com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf. ● Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. SPSM ’11 Proceedings ● Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS) (2012). ● Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: User Attention, Comprehension, and Behavior. Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS ’12. p. 1 (2012). ● Felt, A.P., Greenwood, K., Wagner, D.: The effectiveness of application permissions. Proceeding of the WebApps’11 Proceedings of the 2nd USENIX conference on Web application development. p. 7. USENIX Association, Berkeley, CA, USA (2011). ● Enck, W., Ongtang, M., Mcdaniel, P.: On Lightweight Mobile Phone Application Certification. ACM conference on Computer and communications security. pp. 235–245 (2009).
  • 22. References II ● Android Architecture, http://www.tutorialspoint. com/android/android_architecture.htm. ● Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., Wu, K.-P.: DroidMat: Android Malware Detection through Manifest and API Calls Tracing. 2012 Seventh Asia Joint Conference on Information Security. pp. 62–69 (2012). ● Payet, É., Spoto, F.: Static analysis of Android programs, (2012). ● Guido, M., Ondricek, J., Grover, J., Wilburn, D., Nguyen, T., Hunt, A.: Automated identification of installed malicious Android applications. Digital Investigation (2013). ● Dini, G., Martinelli, F., Saracino, A., Sgandurra, D.: MADAM: A Multi-level Anomaly Detector for Android Malware. In: Kotenko, I. and Skormin, V. (eds.) Computer Network Security. pp. 240–253. Springer Berlin Heidelberg, Berlin, Heidelberg (2012). ● Pocatilu, P.: Android applications security. Inform. Econ. 15, 163–171. Retrieved from http://revistaie.ase.ro (2011).