Abstract
As smartphone are becoming more common, services using smartphones are becoming more pervasive too. Among them, as mobile banking transactions are increasing, payment fraud is also rapidly increasing. These services handle sensitive information, such as users’ personal information and payment information, but as they have several security vulnerabilities, they are attacked by malicious apps. This paper proposes a method of deriving malicious app detection signatures based on the behavior information, obtained by analyzing malicious apps collected through several application distribution channels, and these signatures will be used for analysis of variants of malicious apps and development of rule-based malicious app detection systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kwang-hwi Ahn: A Design and Implementation of Detection System by using Pattern based Behavior Analysis in Android Environment. Graduate School of Soongsil University (2013)
Jin-Sik Yun: Malware Detection Technique of Android-based Smartphone using Static Analysis. Graduate School of Korea Maritime University (2010)
A-Young Lee: A Study on Realtime Detecting Smishing on Cloud Computing Environments. Graduate School of Soongsil University (2014)
Patrick P.K., CHAN, Wen-Kai Song: Static Detection of Android Malware by using permissions and API Calls. Proceedings of the 2014 International Conference on Machine Learning and Cybernetics (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Oh, S., Go, W., Lee, T. (2017). A Study on The behavior-based Malware Detection Signature. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_66
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_66
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)