Abstract
Smartphone has completely improved our life and changed the world. However, the security of smartphone becomes a very serious problem to people’s daily life. With the installation of more and more applications, people become nervous about what these applications do in their smartphones. To discover the anomaly that applications cause, we propose the design and implementation of a framework for discovering anomaly in Android named RayDroid, which monitors the behavior of applications and the flow of data both in Android Framework level and Linux kernel level, aiming to discover the anomaly of smartphones through the analysis. To prove its effectiveness, we also implement the prototype of RayDroid and show it’s effective and efficient through the evaluation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Google Android. http://www.android.com
Lineberry, A., Richardson, D.L., Wyatt, T.: These Aren’t The Permissions You’re Looking For. BlackHat, Las Vegas (2010)
Enck, W., Ongtang, M., McDaniel, P.: Mitigating android software misuse before it happens. Technical report NAS-TR-0094–2008, Pennsylvania State University (2008)
Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: 5th ACM Symposium on Information, Computer and Communications Security (2010)
Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346–360. Springer, Heidelberg (2011)
Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of USENIX OSDI (2010)
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38, 1–30 (2011)
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st Workshop on Security and Privacy in Smartphones and Mobile Devices, CCS-SPSM’11 (2011)
Schlegel, R., Zhang, K., Zhou, X., Intwala, M., Kapadia, A., Wang, X.: Soundcomber: A stealthy and context-aware sound trojan for smartphones. In: 18th Annual Network and Distributed System Security Symposium (NDSS), pp. 17–33 (2011)
Bla ̈sing, T., Schmidt, A.D., Batyuk, L., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: 5th International Conference on Malicious and Unwanted Software, Nancy, France (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, F., Li, Y., Zhai, L. (2015). RayDroid: A Framework for Discovering Anomaly in Android. In: Yueming, L., Xu, W., Xi, Z. (eds) Trustworthy Computing and Services. ISCTCS 2014. Communications in Computer and Information Science, vol 520. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47401-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-662-47401-3_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47400-6
Online ISBN: 978-3-662-47401-3
eBook Packages: Computer ScienceComputer Science (R0)