8 research outputs found

    AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection

    Get PDF
    © 2016 Elsevier Ltd The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-party applications running on top of any Android device. Inter-process communication is one of the most notable features of the Android framework as it allows the reuse of components across process boundaries. This mechanism is used as gateway to access different sensitive services in the Android framework. In the Android platform, this communication system is usually driven by a late runtime binding messaging object known as Intent. In this paper, we evaluate the effectiveness of Android Intents (explicit and implicit) as a distinguishing feature for identifying malicious applications. We show that Intents are semantically rich features that are able to encode the intentions of malware when compared to other well-studied features such as permissions. We also argue that this type of feature is not the ultimate solution. It should be used in conjunction with other known features. We conducted experiments using a dataset containing 7406 applications that comprise 1846 clean and 5560 infected applications. The results show detection rate of 91% using Android Intent against 83% using Android permission. Additionally, experiment on combination of both features results in detection rate of 95.5%

    State of Health Estimation for Lithium-Ion Batteries Based on the Constant Current–Constant Voltage Charging Curve

    No full text
    The state of health is an indicator of battery performance evaluation and service lifetime prediction, which is essential to ensure the reliability and safety of electric vehicles. Although a large number of capacity studies have emerged, there are few simple and effective methods suitable for engineering practice. Hence, a least square support vector regression model with polynomial kernel function is presented for battery capacity estimation. By the battery charging curve, the feature samples of battery health state are extracted. The grey relational analysis is employed for the feature selection, and the K-fold cross-validation is adopted to obtain hyper-parameters of the support vector regression estimation model. To validate this method, the support vector regression estimation model was trained and tested on the battery data sets provided by NASA Prognostics Center of Excellence. The experimental results show that the proposed method only needs some battery feature data, and can achieve high-precision capacity estimation, which indicates that the proposed method shows great efficiency and robustness

    Static Analysis of Android Apps: A Systematic Literature Review

    Get PDF
    Context: Static analysis approaches have been proposed to assess the security of Android apps, by searching for known vulnerabilities or actual malicious code. The literature thus has proposed a large body of works, each of which attempts to tackle one or more of the several challenges that program analyzers face when dealing with Android apps. Objective: We aim to provide a clear view of the state-of-the-art works that statically analyze Android apps, from which we highlight the trends of static analysis approaches, pinpoint where the focus has been put and enumerate the key aspects where future researches are still needed. Method: We have performed a systematic literature review which involves studying around 90 research papers published in software engineering, programming languages and security venues. This review is performed mainly in five dimensions: problems targeted by the approach, fundamental techniques used by authors, static analysis sensitivities considered, android characteristics taken into account and the scale of evaluation performed. Results: Our in-depth examination have led to several key findings: 1) Static analysis is largely performed to uncover security and privacy issues; 2) The Soot framework and the Jimple intermediate representation are the most adopted basic support tool and format, respectively; 3) Taint analysis remains the most applied technique in research approaches; 4) Most approaches support several analysis sensitivities, but very few approaches consider path-sensitivity; 5) There is no single work that has been proposed to tackle all challenges of static analysis that are related to Android programming; and 6) Only a small portion of state-of-the-art works have made their artifacts publicly available. Conclusion: The research community is still facing a number of challenges for building approaches that are aware altogether of implicit-Flows, dynamic code loading features, reflective calls, native code and multi-threading, in order to implement sound and highly precise static analyzers

    Table 11: The detection of malware, which attacks Android OS, based on previous static analysis.

    No full text
    corecore