skip to main content
10.1145/3297280.3297489acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Analysis of application installation logs on Android systems

Published: 08 April 2019 Publication History

Abstract

Various researches and studies are conducted in various fields by analyzing system logs these days. By analyzing logs, developers and researchers can obtain system status and detect the abnormal status of the system. Generally, Logcat is used for analyzing the Android log. Even the Logcat has the advantage of being easy to be executed, it has the disadvantage of being able to check only the basic logs provided by the Logcat. In this paper, we design an installation log management tool and present the analysis of Application installation log files on Android systems. The installation log management tool collects log files which are stored locally and are accessible by only root privileges by using Android Debug Bridge(ADB) and Python. It also extracts the initial installation time, the package name, the used email account information, and etc. when Android Applications are installed.

References

[1]
V3 Mobile Plus, https://www.ahnlab.com/kr/site/product/productView.do?prodSeq=64.
[2]
V3 Mobile Enterprise, https://www.ahnlab.com/kr/site/product/productView.do?prodSeq=102.
[3]
H. Gilbert, and H. Handschuh, "Security Analysis of SHA-256 and Sisters", In Proceedings of International Workshop on Selected Areas in Cryptography, Ottawa, Canada, pp. 175--193, Aug. 14--15, 2003
[4]
M. Du, F. Li, G. Zheng, and V. Srikumar, "DeepLog : Anomaly Detection and Diagnosis from System Logs through Deep Learning", In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, Texas, USA, pp. 1285--1298, Oct. 30 -- Nov. 03, 2017
[5]
K. Berlin, D. Slater, and J. Saxe, "Malicious Behavior Detection using Windows Audit Logs", In Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, Denver, Colorado, USA, pp. 35--44, Oct. 16, 2015
[6]
S. Chaba, R. Kumar, R. Pant, and M. Dave, "Malware Detection Approach for Android systems Using System Call Logs", https://arxiv.org/ftp/arxiv/papers/1709/1709.08805.pdf.
[7]
Loggly, https://www.loggly.com/product/.
[8]
Data Collection and Log Collector Solution, https://goo.gl/kg7cGs.
[9]
Amazon Web Services, https://aws.amazon.com/ko/getting-started/projects/build-log-analytics-solution/.
[10]
mLogcat, http://mlogcat.tistory.com/.
[11]
LogFilter, https://github.com/iookill/LogFilter.
[12]
D. Yuan, H. Mai, W. Xiong, L. Tan, Y. Zhou, S. Pasupathy, "SherLog : Error Diagnosis by Connecting Clues from Run-time Logs", In Proceedings of the fifteenth edition of ASPLOS on Architectural support for programming languages and operating systems, Pittsburgh, Pennsylvania, USA, pp. 143--154, Mar. 13--17, 2010
[13]
T. Yen, A. Oprea, K. Onarlioglu, T. Leetham, W. Robertson, A. Juels, E. Kirda, "Beehive : Large-Scale Log Analysis for Detecting Suspicious Activity in Enterprise Networks", In Proceedings of the 29th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, pp. 199--208, Dec. 09--13, 2013
[14]
Android ads Malware, https://www.businessinsider.com/android-malware-spreads-using-google-adsense-advertising-network-kaspersky-researchers-2016-8.
[15]
Pydiff, https://pypi.org/project/pydiff/.
[16]
Contagio Mobile, http://contagiominidump.blogspot.com/.
[17]
Event Logging, https://firebase.google.com/docs/analytics/cpp/events.
[18]
Android - Event Handling, https://www.tutorialspoint.com/android/android_event_handling.htm.
[19]
Android Logcat, https://developer.android.com/studio/commandline/logcat?hl=ko.
[20]
The 70 best Android apps in 2018: Get the best from your phone, http://www.alphr.com/google/6902/best-android-apps-free-paid.
[21]
AppsFlyer, https://www.appsflyer.com/.
[22]
Google Play Install Referrer, https://developer.android.com/google/play/installreferrer/.

Cited By

View all
  • (2024)From Logging to Leakage: A Study of Privacy Leakage in Android App LogsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695340(2484-2485)Online publication date: 27-Oct-2024
  • (2023)Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMTApplied Sciences10.3390/app1305306113:5(3061)Online publication date: 27-Feb-2023
  • (2022)Landscape of Automated Log Analysis: A Systematic Literature Review and Mapping StudyIEEE Access10.1109/ACCESS.2022.315254910(21892-21913)Online publication date: 2022
  • Show More Cited By

Index Terms

  1. Analysis of application installation logs on Android systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing
    April 2019
    2682 pages
    ISBN:9781450359337
    DOI:10.1145/3297280
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 April 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Android
    2. installation log
    3. installation log management tool
    4. log analysis

    Qualifiers

    • Research-article

    Funding Sources

    • Ministry of Education

    Conference

    SAC '19
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Upcoming Conference

    SAC '25
    The 40th ACM/SIGAPP Symposium on Applied Computing
    March 31 - April 4, 2025
    Catania , Italy

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 20 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)From Logging to Leakage: A Study of Privacy Leakage in Android App LogsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695340(2484-2485)Online publication date: 27-Oct-2024
    • (2023)Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMTApplied Sciences10.3390/app1305306113:5(3061)Online publication date: 27-Feb-2023
    • (2022)Landscape of Automated Log Analysis: A Systematic Literature Review and Mapping StudyIEEE Access10.1109/ACCESS.2022.315254910(21892-21913)Online publication date: 2022
    • (2020)On the Security of Application Installers and Online Software RepositoriesDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-030-52683-2_10(192-214)Online publication date: 24-Jun-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media