Skip to main content

RayDroid: A Framework for Discovering Anomaly in Android

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 520))

Included in the following conference series:

  • 934 Accesses

Abstract

Smartphone has completely improved our life and changed the world. However, the security of smartphone becomes a very serious problem to people’s daily life. With the installation of more and more applications, people become nervous about what these applications do in their smartphones. To discover the anomaly that applications cause, we propose the design and implementation of a framework for discovering anomaly in Android named RayDroid, which monitors the behavior of applications and the flow of data both in Android Framework level and Linux kernel level, aiming to discover the anomaly of smartphones through the analysis. To prove its effectiveness, we also implement the prototype of RayDroid and show it’s effective and efficient through the evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Google Android. http://www.android.com

  2. Lineberry, A., Richardson, D.L., Wyatt, T.: These Aren’t The Permissions You’re Looking For. BlackHat, Las Vegas (2010)

    Google Scholar 

  3. Enck, W., Ongtang, M., McDaniel, P.: Mitigating android software misuse before it happens. Technical report NAS-TR-0094–2008, Pennsylvania State University (2008)

    Google Scholar 

  4. Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: 5th ACM Symposium on Information, Computer and Communications Security (2010)

    Google Scholar 

  5. Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346–360. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  6. Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of USENIX OSDI (2010)

    Google Scholar 

  7. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38, 1–30 (2011)

    Google Scholar 

  8. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM’11 (2011)

    Google Scholar 

  9. Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A stealthy and context-aware sound trojan for smartphones. In: 18th Annual Network and Distributed System Security Symposium (NDSS), pp. 17–33 (2011)

    Google Scholar 

  10. Bla ̈sing, T., Schmidt, A.D., Batyuk, L., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 5th International Conference on Malicious and Unwanted Software, Nancy, France (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, F., Li, Y., Zhai, L. (2015). RayDroid: A Framework for Discovering Anomaly in Android. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47401-3_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47400-6

  • Online ISBN: 978-3-662-47401-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics