Browse > Article
http://dx.doi.org/10.17662/ksdim.2015.11.2.047

A Research on Mobile Malware Model propagated Update Attacks  

Ju, Seunghwan (한국기술교육대학교 컴퓨터공학과)
Seo, Heesuk (한국기술교육대학교 창의융합협동과정)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.11, no.2, 2015 , pp. 47-54 More about this Journal
Abstract
The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.
Keywords
Mobile Security; Application Permission; Application Analysis; Mobile Malware;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Y. Zhou and X. Jiang, "Dissecting Android Malware: Characterization and Evolution," Proc 33rd IEEE Symp Security and Privacy, 2012.
2 L. K. Yan and H. Yin, "DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis," Proc 21st USENIX conf. Security Symp., Security, 2012.
3 R. Xu, H. Saidi, and R. Anderson, "Aurasium: Practical Policy Enforcement for Android Applications," 21st USENIX Security Symp. USENIX, 2012.
4 M. Chandramohan, and H. B. K. Tan, "Detection of Moblie Malware in the Wild," Comput., vol, 45 no. 9, Sept. 2012.
5 A. Moser, C. Kruegel, and E. Kirda, "Exploring Multiple Execution Paths for Malware Analysis," Proc. IEEE Symp. Security Privacy, SP, 2007, pp. 231-245.
6 W. Enck et al., "A Study of Android Application Security," Proc. 20th USENIX Conf. Security, Security, 2011.
7 Google. . Available: http://developer.android.com/guide/topics/manifest/permission-element.html.
8 Google. Android market developer program policies. Available: http://www.android.com/us/developer-content-policy.html.
9 F-Secure, "MOBILE THREAT REPORT, " 2014.
10 최희식, 조양현, "사물인넷 보안 문제제기와 대안," 디지털산업정보학회 논문지, 11권 1호, 2015, pp. 69-78.
11 신현조, 이경동, 박태형, "인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석," 디지털산업정보학회논문지, 10권 4호, 2015, pp. 97-107.   DOI