CFP last date
20 May 2024
Reseach Article

Malicious Applications Detection by Analyzing Manifest Files

by Aparna Harikumar, Chandrika Kapre, Rajeshwari Chandratre, Dhaval Adhav, S.r.rathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 5
Year of Publication: 2015
Authors: Aparna Harikumar, Chandrika Kapre, Rajeshwari Chandratre, Dhaval Adhav, S.r.rathi
10.5120/21221-3942

Aparna Harikumar, Chandrika Kapre, Rajeshwari Chandratre, Dhaval Adhav, S.r.rathi . Malicious Applications Detection by Analyzing Manifest Files. International Journal of Computer Applications. 120, 5 ( June 2015), 8-12. DOI=10.5120/21221-3942

@article{ 10.5120/21221-3942,
author = { Aparna Harikumar, Chandrika Kapre, Rajeshwari Chandratre, Dhaval Adhav, S.r.rathi },
title = { Malicious Applications Detection by Analyzing Manifest Files },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 5 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number5/21221-3942/ },
doi = { 10.5120/21221-3942 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:05:25.727572+05:30
%A Aparna Harikumar
%A Chandrika Kapre
%A Rajeshwari Chandratre
%A Dhaval Adhav
%A S.r.rathi
%T Malicious Applications Detection by Analyzing Manifest Files
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 5
%P 8-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid rise in the use of Android worldwide, the harm done due to malicious applications is increasing exponentially. Due to this the data of the Android users is not secure, and we need a system to detect the maliciousness of the applications being downloaded. The project being developed here is a solution to this problem as it detects whether an application is malicious or benign, this will not only provide data security but will also enhance the performance of the user's device. There are a number of systems like DroidMat and signature-based systems, already available in the market that detect malicious applications. But these systems detect that on the base of signatures and by parsing smali files which not only increases the processing time but also does not provide accurate results. The proposed system here that is Malicious applications detection using permissions retrieval detects whether an application is malicious or not based on the keywords present in the manifest file. This method does not affect the performance of the device in any way and gives us better throughput.

References
  1. I. Burguera, U. Z. , Nadijm-Tehrani, S. : Crowdroid: Behavior- Based Malware Detection System for Android. In: SPSM'11, ACM(October 2011)
  2. A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, Y. Weiss: Andromaly: a behavioral malware detection framework for Android devices. Journal of Intelligent Information Systems 38(1) (January 2011) 161-190
  3. G. Dini, F. Martinelli, A. Saracino, D. Sgandurra: MADAM: a Multi-Level Anomaly Detector for Android Malware
  4. Schmidt, A. D. , Peters, F. , Lamour, F. , Scheel, C. , Camtepe, s. A. , Albayrak, S. : Monitoring smartphones for anomaly detection. Mob. Netw. Appl. 14(1)(2009) 92-106
  5. Xie,L. ,Zhang,X. ,Seifert, J. P. ,Zhu, S. : pBMDS: a behavior-based malware detection system for cellphone devices. In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24 2010, ACM(2010) 37-48
  6. Enck, W. , Ongtang, M. , McDaniel, P. : On lightweight mobile phone application certification. In: CCS '09: Proceedings of the 16th ACM conference on Computer and Communication Security, New York, NY, USA, ACM (2009) 235-245
  7. Ongtang, M. , McLaughlin, S. , Enck, W. , McDaniel, P. : Semantically Rich Application-Centric Security in Android. In: Computer Security Applications Conference, 2009. ACSAC '09. Annual. (Dec 2009) 340-349
  8. Schmidt, A. D. , Bye, R. , Schmidt, H. G. , Clausen, J. H. , Kiraz, O. , Yuksel, K. A. , Camtepe, S. A. , Albayrak, S. : Static Analysis of Executables for Collaborative Malware Detection on Android. In: Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, 14-18 June 2009, IEEE (2009) 1-5
  9. La Polla, M. , Martinelli, F. , Sgandurra, D. : A survey on security for mobile devices. Communications Surveys Tutorials, IEEE PP(99) (2012) 1-26.
  10. LakhmiPriyaSekar,Vinitha Reddy Gankidi, SelvakumarSubramanian. ,Avoidance of Security Breach through Selective Permissions in Android Operating System. ACM SIGSOFT Software Engineering Notes,September 2012 Volume 37 Number 5.
  11. AlexandreBartel,JacquesKlein,MartinMonperrous. AutomaticallSecuring Permission-Based Software by Reducing the Attack Surface:An Application to Android.
  12. Mohammad Nauman and Sohail Khan. Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform. The International Arab Journal of Information Technology, Vol. 8, No. 4, Oct 2011
Index Terms

Computer Science
Information Sciences

Keywords

Android smart phones manifest file.