• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Mining apps for abnormal usage of sensitive data
 
  • Details
  • Full
Options
2015
Conference Paper
Title

Mining apps for abnormal usage of sensitive data

Abstract
What is it that makes an app malicious? One important factor is that malicious apps treat sensitive data differently from benign apps. To capture such differences, we mined 2,866 benign Android applications for their data flow from sensitive sources, and compare these flows against those found in malicious apps. We find that (a) for every sensitive source, the data ends up in a small number of typical sinks; (b) these sinks differ considerably between benign and malicious apps; (c) these differences can be used to flag malicious apps due to their abnormal data flow; and (d) malicious apps can be identified by their abnormal data flow alone, without requiring known malware samples. In our evaluation, our MUDFLOW prototype correctly identified 86.4% of all novel malware, and 90.1% of novel malware leaking sensitive data.
Author(s)
Avdiienko, Vitalii
Kuznetsov, Konstantin
Gorla, Alessandra
Zeller, Andreas
Arzt, Steven  
Rasthofer, Siegfried
Bodden, Eric  
Mainwork
IEEE/ACM 37th IEEE International Conference on Software Engineering, ICSE 2015. Proceedings. Vol.1, Pt.1  
Conference
International Conference on Software Engineering (ICSE) 2015  
DOI
10.1109/ICSE.2015.61
Language
English
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024