Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case

As Irina Mariuca, Jorge Blasco, Thomas M. Chen, Harsha Kumara Kalutarage, Igor Muttik, Hoang Nga Nguyen, Markus Roggenbach, Siraj Ahmed Shaikh

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Malware has been a major problem in desktop computing for decades. With the recent trend towards mobile computing, malware is moving rapidly to smartphone platforms. ``Total mobile malware has grown 151% over the past year'', according to McAfee®'s quarterly treat report in September 2016. By design, AndroidTM is ``open'' to download apps from different sources. Its security depends on restricting apps by combining digital signatures, sandboxing, and permissions. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps for which combined permissions allow them to carry out attacks. In this chapter we report on recent and ongoing research results from our ACID project which suggest a number of reliable means to detect collusion, tackling the aforementioned problems. We present our conceptual work on the topic of collusion and discuss a number of automated tools arising from it.
Original languageEnglish
Title of host publicationData Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications
EditorsIván Palomares Carrascosa, Harsha Kumara Kalutarage, Yan Huang
Place of PublicationCham
PublisherSpringer International Publishing
Pages55-97
Number of pages43
ISBN (Print)978-3-319-59439-2
DOIs
Publication statusPublished - 02 Aug 2017

Fingerprint

Application programs
Electronic document identification systems
Mobile computing
Smartphones
Android (operating system)
Malware

Cite this

Mariuca, A. I., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., ... Shaikh, S. A. (2017). Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case. In I. Palomares Carrascosa, H. K. Kalutarage, & Y. Huang (Eds.), Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications (pp. 55-97). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-59439-2_3
Mariuca, As Irina ; Blasco, Jorge ; Chen, Thomas M. ; Kalutarage, Harsha Kumara ; Muttik, Igor ; Nguyen, Hoang Nga ; Roggenbach, Markus ; Shaikh, Siraj Ahmed. / Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case. Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. editor / Iván Palomares Carrascosa ; Harsha Kumara Kalutarage ; Yan Huang. Cham : Springer International Publishing, 2017. pp. 55-97
@inbook{a51d9915f7d24c919056f15375fda4e9,
title = "Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case",
abstract = "Malware has been a major problem in desktop computing for decades. With the recent trend towards mobile computing, malware is moving rapidly to smartphone platforms. ``Total mobile malware has grown 151{\%} over the past year'', according to McAfee{\circledR}'s quarterly treat report in September 2016. By design, AndroidTM is ``open'' to download apps from different sources. Its security depends on restricting apps by combining digital signatures, sandboxing, and permissions. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps for which combined permissions allow them to carry out attacks. In this chapter we report on recent and ongoing research results from our ACID project which suggest a number of reliable means to detect collusion, tackling the aforementioned problems. We present our conceptual work on the topic of collusion and discuss a number of automated tools arising from it.",
author = "Mariuca, {As Irina} and Jorge Blasco and Chen, {Thomas M.} and Kalutarage, {Harsha Kumara} and Igor Muttik and Nguyen, {Hoang Nga} and Markus Roggenbach and Shaikh, {Siraj Ahmed}",
year = "2017",
month = "8",
day = "2",
doi = "10.1007/978-3-319-59439-2_3",
language = "English",
isbn = "978-3-319-59439-2",
pages = "55--97",
editor = "{Palomares Carrascosa}, Iv{\'a}n and Kalutarage, {Harsha Kumara} and Yan Huang",
booktitle = "Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications",
publisher = "Springer International Publishing",

}

Mariuca, AI, Blasco, J, Chen, TM, Kalutarage, HK, Muttik, I, Nguyen, HN, Roggenbach, M & Shaikh, SA 2017, Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case. in I Palomares Carrascosa, HK Kalutarage & Y Huang (eds), Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. Springer International Publishing, Cham, pp. 55-97. https://doi.org/10.1007/978-3-319-59439-2_3

Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case. / Mariuca, As Irina; Blasco, Jorge; Chen, Thomas M.; Kalutarage, Harsha Kumara; Muttik, Igor; Nguyen, Hoang Nga; Roggenbach, Markus; Shaikh, Siraj Ahmed.

Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. ed. / Iván Palomares Carrascosa; Harsha Kumara Kalutarage; Yan Huang. Cham : Springer International Publishing, 2017. p. 55-97.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case

AU - Mariuca, As Irina

AU - Blasco, Jorge

AU - Chen, Thomas M.

AU - Kalutarage, Harsha Kumara

AU - Muttik, Igor

AU - Nguyen, Hoang Nga

AU - Roggenbach, Markus

AU - Shaikh, Siraj Ahmed

PY - 2017/8/2

Y1 - 2017/8/2

N2 - Malware has been a major problem in desktop computing for decades. With the recent trend towards mobile computing, malware is moving rapidly to smartphone platforms. ``Total mobile malware has grown 151% over the past year'', according to McAfee®'s quarterly treat report in September 2016. By design, AndroidTM is ``open'' to download apps from different sources. Its security depends on restricting apps by combining digital signatures, sandboxing, and permissions. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps for which combined permissions allow them to carry out attacks. In this chapter we report on recent and ongoing research results from our ACID project which suggest a number of reliable means to detect collusion, tackling the aforementioned problems. We present our conceptual work on the topic of collusion and discuss a number of automated tools arising from it.

AB - Malware has been a major problem in desktop computing for decades. With the recent trend towards mobile computing, malware is moving rapidly to smartphone platforms. ``Total mobile malware has grown 151% over the past year'', according to McAfee®'s quarterly treat report in September 2016. By design, AndroidTM is ``open'' to download apps from different sources. Its security depends on restricting apps by combining digital signatures, sandboxing, and permissions. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps for which combined permissions allow them to carry out attacks. In this chapter we report on recent and ongoing research results from our ACID project which suggest a number of reliable means to detect collusion, tackling the aforementioned problems. We present our conceptual work on the topic of collusion and discuss a number of automated tools arising from it.

U2 - 10.1007/978-3-319-59439-2_3

DO - 10.1007/978-3-319-59439-2_3

M3 - Chapter

SN - 978-3-319-59439-2

SP - 55

EP - 97

BT - Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications

A2 - Palomares Carrascosa, Iván

A2 - Kalutarage, Harsha Kumara

A2 - Huang, Yan

PB - Springer International Publishing

CY - Cham

ER -

Mariuca AI, Blasco J, Chen TM, Kalutarage HK, Muttik I, Nguyen HN et al. Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case. In Palomares Carrascosa I, Kalutarage HK, Huang Y, editors, Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications. Cham: Springer International Publishing. 2017. p. 55-97 https://doi.org/10.1007/978-3-319-59439-2_3