Static and Dynamic Analysis of Android Malware

Ankita Kapratwar, Fabio Di Troia, Mark Stamp

2017

Abstract

Static analysis relies on features extracted without executing code, while dynamic analysis extracts features based on execution (or emulation). In general, static analysis is more efficient, while dynamic analysis can be more informative, particularly in cases where the code is obfuscated. Static analysis of an Android application can, for example, rely on features extracted from the manifest file or the Java bytecode, while dynamic analysis of such applications might deal with features involving dynamic code loading and system calls. In this research, we apply machine learning techniques to analyze the relative effectiveness of particular static and dynamic features for detecting Android malware. We also carefully analyze the robustness of the scoring techniques under consideration.

Download


Paper Citation


in Harvard Style

Kapratwar A., Di Troia F. and Stamp M. (2017). Static and Dynamic Analysis of Android Malware . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ForSE, (ICISSP 2017) ISBN 978-989-758-209-7, pages 653-662. DOI: 10.5220/0006256706530662

in Bibtex Style

@conference{forse17,
author={Ankita Kapratwar and Fabio Di Troia and Mark Stamp},
title={Static and Dynamic Analysis of Android Malware},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ForSE, (ICISSP 2017)},
year={2017},
pages={653-662},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006256706530662},
isbn={978-989-758-209-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ForSE, (ICISSP 2017)
TI - Static and Dynamic Analysis of Android Malware
SN - 978-989-758-209-7
AU - Kapratwar A.
AU - Di Troia F.
AU - Stamp M.
PY - 2017
SP - 653
EP - 662
DO - 10.5220/0006256706530662