Browse > Article
http://dx.doi.org/10.7472/jksii.2013.14.3.35

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices  

Ham, You Joung (School of Computer Engineering, Hanshin University)
Lee, Hyung-Woo (School of Computer Engineering, Hanshin University)
Publication Information
Journal of Internet Computing and Services / v.14, no.3, 2013 , pp. 35-46 More about this Journal
Abstract
As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.
Keywords
Android; Malicious Application; Event Aggregation; Mobile Device; Malicious App. Detection;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Jaeyoung Lee, Doeun Kim, Jiyoung Lee, "An Integrity Verification Method for Secure Application on the Smartphone", Journal of Advanced Information Technology and Convergence, Vol. 9, No. 10, pp.223-228, 2011. 10.
2 Wontae Sim, Jongmyoung Kim, Jaechul Ryu, Bongnam Noh, "Android Application Analysis Method for Malicious Activity Detection", Journal of KIISC(Korea Institution of Information Security and Cryptology) Vol. 21, No.1, pp.213-219, 2011. 2.   과학기술학회마을
3 Woobong Chun, Junghee Lee, Wonhyung Park, Taemyoung Jung, "The Mobile Security Diagnostic System against Smartphone Threat", Journal of KIISC, Vol.22, No.3, pp.537-544, 2012. 6.
4 Woohyung Ahn, Jungmin Lee, Seungho Lim, Jaewon Oh, "Detection Malware on Smartphone by Tracking of the Execution of Basic Blocks", Journal of KIISE(Korean Institute of Information Scientists and Engineers): System and Theory, Vol.39, No.3, pp.179-187, 2012. 6
5 Android Developer Web Site, "Android.com. (2009b, December 16). What is android?", Android Developer (http://developer.android.com/guide/basics/ what-is-android.html), 2009. 12
6 Kyoungmin Kim, "A Study on Client Information Protection in Domestic Banking As Introducing Smartphone Banking", Journal of KIISC, Vol.20, No.6, pp.51-62, 2010. 12.
7 Youngdong Kim, Ikwhan Kim, Taehyun Kim, "Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism", Journal of KIISC, Vol.22, No.5, pp.1145-1157, 2012. 10.   과학기술학회마을
8 Moonyoung Whang, Woong Goh, Dongbum Lee, Jin Gwak, "Certificate Management Plan in Smartphonebanking using the Mobile-Cloud Computing", Proceedings of IEEK(Institute of Electronics Engineers of Korea) Conference, pp. 1873-1876, 2010. 6.
9 "Andromaly: a behavioral Malware detection framework for android devices", Proceedings of IEEK Conference, pp.1-30, 2010.6