Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 327))

  • 3716 Accesses

Abstract

The paper proposes an advanced filter based android malware detection platform that can be implemented as an add-on to the Google-playstore – the official provider of android applications worldwide. The mechanism uses the signature based, behavioral based technique and the advanced sandboxing technique for detection. It also uses the application rating and provider reputation into account, so as to filter out the input given to the system, this mechanism if implemented efficiently, in long run can be a very effective method to detect the malware when an application is published on the application stores.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kesavan, M., Sharma, L.R.: Securing Models for Android Market-Places. International Journal of Advance Research 1(7) (July 2013), ISSN 2320-9194

    Google Scholar 

  2. Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged applica-tions in third party Android marketplaces. In: CODASPY 2012, San Antonio, Texas, USA, February 7–9 (2012)

    Google Scholar 

  3. Android-market-api, (Online accessed on January 15, 2014), https://code.google.com/p/android-market-api/

  4. Aung, Z., Zaw, W.: Permission bases Android Malware Detection. International Journal of Scientific & Technology Research 2(3) (March 2013)

    Google Scholar 

  5. Pamuk, O., Jin, H.: Behavioural analysis model and decision tree classification of malware for android. International Journal of Advance Research 1(7) (July 2013) ISSN 2320-9194.

    Google Scholar 

  6. VirusTotal (Online accessed on January 15, 2014), https://www.virustotal.com/

  7. Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A Study of Android Appli-cation Security. In: Proceedings of the 20th USENIX Security Symposium, USENIX Security

    Google Scholar 

  8. Bläsing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S.A., Albayrak, S.: An Android Application Sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE), October 19-20, pp. 55–62 (2010)

    Google Scholar 

  9. Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J.H., Camtepe, S.A., Al-bayrak, S., Yildizli, C.: Smartphone malware evolution revisited: Android next target? In: Proceedings of the 4th IEEE International Conference on Malicious and Unwanted Software (Malware 2009), pp. 1–7. IEEE (2009)

    Google Scholar 

  10. Dini, G., Martinelli, F., Saracino, A., Sgandurra, D.: MADAM: A multi-level anomaly detector for android malware. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 240–253. Springer, Heidelberg (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jithin Thomas Andoor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Andoor, J.T. (2015). A Filtering Based Android Malware Detection System for Google PlayStore. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 327. Springer, Cham. https://doi.org/10.1007/978-3-319-11933-5_63

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11933-5_63

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11932-8

  • Online ISBN: 978-3-319-11933-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics