Abstract

Abstract Since its launch in 2007, Google's open source mobile operating system Android has become the most prominent OS for smartphones. Availability of 3 million Android apps on official repository, Google Play Store, and a not too tightly controlled environment for app developers have added to the popularity of Android and growth of Android devices. This, however, has also provided an opportunity for malware writers to create inroads into Android devices through malicious apps on App stores including Google Play. These malicious apps may access and leak sensitive information such as details of calls, SMS, emails, pictures, contacts, location, password, etc. Loss of this personal data may lead to fraud, financial loss, threatening, etc. Various solutions based on static, dynamic, or hybrid analysis are proposed by state-of-the-art in the last decade. However, malware writers have also come up with ingenious ways of circumventing detection tools. Recent malware deploy threats like obfuscated and encrypted code, dynamic code loading, and reflection, etc. which fail static analysis approaches employing bytecode for analysis. Dynamic analysis is robust against these evasive methods because it executes the application in the controlled environment. In this chapter, we review dynamic analysis techniques for Android and evaluate these experimentally. We discuss various antidetection methods used by recent Android malware to circumvent even dynamic analysis. We compare the effectiveness of various state-of-the-art dynamic analysis techniques against antidetection techniques. With this chapter, we try to highlight issues and challenges concerned to Android malware analysis techniques that require the attention of research community to avoid loss of end user.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.