DOI QR코드

DOI QR Code

A Research on Mobile Malware Model propagated Update Attacks

변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구

  • 주승환 (한국기술교육대학교 컴퓨터공학과) ;
  • 서희석 (한국기술교육대학교 창의융합협동과정)
  • Received : 2015.05.30
  • Accepted : 2015.06.09
  • Published : 2015.06.30

Abstract

The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

Keywords

References

  1. Y. Zhou and X. Jiang, "Dissecting Android Malware: Characterization and Evolution," Proc 33rd IEEE Symp Security and Privacy, 2012.
  2. L. K. Yan and H. Yin, "DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis," Proc 21st USENIX conf. Security Symp., Security, 2012.
  3. R. Xu, H. Saidi, and R. Anderson, "Aurasium: Practical Policy Enforcement for Android Applications," 21st USENIX Security Symp. USENIX, 2012.
  4. M. Chandramohan, and H. B. K. Tan, "Detection of Moblie Malware in the Wild," Comput., vol, 45 no. 9, Sept. 2012.
  5. A. Moser, C. Kruegel, and E. Kirda, "Exploring Multiple Execution Paths for Malware Analysis," Proc. IEEE Symp. Security Privacy, SP, 2007, pp. 231-245.
  6. W. Enck et al., "A Study of Android Application Security," Proc. 20th USENIX Conf. Security, Security, 2011.
  7. Google. . Available: http://developer.android.com/guide/topics/manifest/permission-element.html.
  8. Google. Android market developer program policies. Available: http://www.android.com/us/developer-content-policy.html.
  9. F-Secure, "MOBILE THREAT REPORT, " 2014.
  10. 최희식, 조양현, "사물인넷 보안 문제제기와 대안," 디지털산업정보학회 논문지, 11권 1호, 2015, pp. 69-78.
  11. 신현조, 이경동, 박태형, "인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석," 디지털산업정보학회논문지, 10권 4호, 2015, pp. 97-107. https://doi.org/10.17662/KSDIM.2014.10.1.097