Tracing Malicious Android Applications From Memory Dumps

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Khalid Imran, 01-247202-008
dc.date.accessioned 2022-12-21T10:06:53Z
dc.date.available 2022-12-21T10:06:53Z
dc.date.issued 2022
dc.identifier.uri http://hdl.handle.net/123456789/14472
dc.description Supervised by Dr. Faisal Bashir Hussain en_US
dc.description.abstract With the rapid increase in smartphone users, Android has become the most widely used Operating System in mobile devices. Due to its popularity, Android is the prime target for malicious applications, which poses a serious and evolving security threat to these devices. Existing studies focused on statistical features such as intent, permissions, API calls, and entropy for the detection of malicious apps. It is di cult to achieve a high degree of accuracy using static analysis due to the growing use of modern obfuscation techniques in Android applications. In recent years, dynamic analysis has come out as the front runner for in-depth analysis of software applications. Contemporary studies have shown e cient malware detection using resource consumption, opcode, heap dump information, object reference graph, and Process Control Block (PCB), which are extracted from process memory. Among the aforementioned feature sources, PCB contains the most in-depth and precise working information for the analysis of Android applications. Due to the complex structure of PCB in Linux-based Operating System, very limited existing work has explored the possibility of malware detection using PCB. In this study, a framework for ngerprinting malicious Android applications is presented. The implemented framework is capable of installing, executing, issuing pseudorandom events to the application, dumping memory of the device, extract PCB from memory dump and saving the result to a datastore (csv le). We extracted a comprehensive feature set that comprises of 526 features, which are then reduced to 98 features for identi cation and categorization of Android applications into ve distinct categories. The proposed feature set is evaluated by using Decision Tree, NB, SVM and KNN machine learning classi ers. The results demonstrate that the proposed PCB-based features can signi cantly improve malware detection using Decision Tree and SVM en_US
dc.language.iso en en_US
dc.publisher Computer Sciences en_US
dc.relation.ispartofseries MS (IS);T-01875
dc.subject Decision Tree en_US
dc.subject Linux-based Operating System en_US
dc.title Tracing Malicious Android Applications From Memory Dumps en_US
dc.type MS Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account