CFP last date
20 June 2024
Reseach Article

Spyware Detection based upon Hybrid Approach in Android Smartphones

by Sumit Sharma, Parmjit Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 14
Year of Publication: 2014
Authors: Sumit Sharma, Parmjit Kaur
10.5120/17249-7588

Sumit Sharma, Parmjit Kaur . Spyware Detection based upon Hybrid Approach in Android Smartphones. International Journal of Computer Applications. 98, 14 ( July 2014), 6-9. DOI=10.5120/17249-7588

@article{ 10.5120/17249-7588,
author = { Sumit Sharma, Parmjit Kaur },
title = { Spyware Detection based upon Hybrid Approach in Android Smartphones },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 14 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number14/17249-7588/ },
doi = { 10.5120/17249-7588 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:10.969919+05:30
%A Sumit Sharma
%A Parmjit Kaur
%T Spyware Detection based upon Hybrid Approach in Android Smartphones
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 14
%P 6-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Smart phones, which were once a luxury product has now become a household product. This transformation has been due to the vast amount of functionalities which a smart phone provides in just a single device. Smartphone OS, such as Android, is an Open Source mobile platform that enables us to install third party applications. Due to large amount of applications that are available on the app store, it becomes very difficult for a user to distinguish between a malware free and malware containing application. In this paper, we are proposing a hybrid approach for detection of spyware genre applications out of all the installed applications.

References
  1. Egele, Manuel, Theodoor Scholte, Engin Kirda, and Christopher Kruegel. "A survey on automated dynamic malware-analysis techniques and tools. " ACM Computing Surveys (CSUR) 44, no. 2 (2012): 6.
  2. Blasing, Thomas, Leonid Batyuk, A-D. Schmidt, Seyit Ahmet Camtepe, and Sahin Albayrak. "An android application sandbox system for suspicious software detection. " In Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on, pp. 55-62, IEEE, 2010.
  3. A. pinto, "Android Malware 400% increase" [ Available online]: http://cybersecurity. mit. edu/2012/11/android-malware-400-increase/.
  4. Vinod, P. , R. Jaipur, V. Laxmi, and M. Gaur. "Survey on malware detection methods. " In Proceedings of the 3rd Hackers' Workshop on Computer and Internet Security (IITKHACK'09), pp. . 74-79. 2009
  5. Mohd Afizi, Mohd Shukran, Wan Sharil and Sham Bin Sharif, "Android Augmented Reality System In Malaysia Military Operations – Unit Positions. " in Australian Journal of Basic and Applied Sciences, Vol. 6, Issue 8, p79, Aug2012.
  6. Sharma Sumit, Rohitt Sharma, Paramjit Singh, and Aditya Mahajan. "Age Based User Interface in Mobile Operating System. " arXiv preprint arXiv:1205. 1687 (2012).
  7. Agematsu, Harunobu, Junya Kani, Kohei Nasaka, Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, and Masakatsu Nishigaki, "A Proposal to Realize the Provision of Secure Android Applications--ADMS: An Application Development and Management System. " In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, pp. 677-682, IEEE, 2012.
  8. Nema Behutiye, Woubshet. "Android ECG Application Development. " (2012).
  9. Features of Samsung Galaxy S5 [Available Online http://www. gsmarena. com/samsung_galaxy_s5-6033. php
  10. Satpal, Nitin B. "Enhancing Permission Model of Android. " PhD diss. , Indian Institute of Technology Bombay, 2013.
  11. Shin, Wook, Shinsaku Kiyomoto, Kazuhide Fukushima, and Toshiaki Tanaka. "A formal model to analyze the permission authorization and enforcement in the android framework. " In Social Computing (SocialCom), 2010 IEEE Second International Conference on, pp. 944-951. IEEE, 2010.
  12. Boksasp, Trond, and Eivind Utnes. "Android apps and permissions: Security and privacy risks. " (2012).
  13. The Android Developer's Guide Graphical Layout [Available Online] http://developer. android. com/tools/help/adt. html#graphical-editor/
  14. Learn Android- Tutorials For Developing With Android [Available Online] http://www. learn-android. com/2010/01/05/android-layout-tutorial/
  15. The Android Developer's Guide – Frame Layout [Available Online] http://developer. android. com/reference/android/widget/FrameLayout. html
  16. The Android Developer's Guide - Android Manifest Permissions [Available Online] http://developer. android. com/reference/android/Manifest. permission. html
  17. Au, Kathy Wain Yee, Yi Fan Zhou, Zhen Huang, Phillipa Gill, and David Lie. "Short paper: a look at smartphone permission models. " In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pp. 63-68. ACM, 2011.
  18. Android Development Tutorial [Available Online] http://www. vogella. com/tutorials/Android/article. html
  19. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018, White Paper, February 5, 2014.
  20. Kaur, Parmjit, and Sumit Sharma. "Google Android a mobile platform: A review. " In Engineering and Computational Sciences (RAECS), 2014 Recent Advances in, pp. 1-5. IEEE, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Android Privacy Spyware Android Permission Database Frame Layout Static Source Code Analysis