Proceedings 2015 Network and Distributed System Security Symposium 2015
DOI: 10.14722/ndss.2015.23145
|View full text |Cite
|
Sign up to set email alerts
|

CopperDroid: Automatic Reconstruction of Android Malware Behaviors

Abstract: Mobile devices and their application marketplaces drive the entire economy of the today's mobile landscape. Android platforms alone have produced staggering revenues, exceeding five billion USD, which has attracted cybercriminals and increased malware in Android markets at an alarming rate. To better understand this slew of threats, we present CopperDroid, an automatic VMI-based dynamic analysis system to reconstruct the behaviors of Android malware. The novelty of CopperDroid lies in its agnostic approach to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
166
0
1

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 305 publications
(167 citation statements)
references
References 22 publications
0
166
0
1
Order By: Relevance
“…In this case, the user must determine a mapping between the system call method and API methods that use the system call. Such tools include CopperDroid [39], AASandbox [10] and Crowdroid [12]. If only specific system calls are traced (e.g.…”
Section: ) Analyzing Api Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the user must determine a mapping between the system call method and API methods that use the system call. Such tools include CopperDroid [39], AASandbox [10] and Crowdroid [12]. If only specific system calls are traced (e.g.…”
Section: ) Analyzing Api Methodsmentioning
confidence: 99%
“…Given a set of targeted APIs that represent the analysis performed by the dynamic tool, IntelliDroid will find instances of these targeted APIs in the application and generate inputs to trigger them. These inputs can be injected into an actual Android system, allowing IntelliDroid to be integrated with any dynamic analysis tool, including those that monitor application execution from an instrumented OS [19], or from a virtual machine emulator [39]. To accomplish this task, IntelliDroid takes the following steps: 1) Identify invocations of targeted APIs.…”
Section: Designmentioning
confidence: 99%
“…malicious code or heavy computation code [20]) in Android apps. TaintDroid [21], DroidScope [39], CopperDroid [35] and VetDroid [42] conducted dynamic taint analysis to detect Yes suspicious behaviors at runtime. Static analysis requires access to complete bytecode program and therefore can be simply evaded by runtime packers.…”
Section: Question Set 4: Android Unpackersmentioning
confidence: 99%
“…CopperDroid [23] operates Android malware on QEMU, and analyzes the behavior of this malware by hooking the system calls. An analysis of Android-specific IPC using Binder is achieved by hooking ioctl(), which sends Binder the c 2016 Information Processing Society of Japan data.…”
Section: Related Workmentioning
confidence: 99%