Malicious Code Detection for Android Using Instruction Signatures

Hu Ge,Li Ting,Dong Hang,Yu Hewei,Zhang Miao
DOI: https://doi.org/10.1109/SOSE.2014.48
2014-01-01
Abstract:This paper provides an overview of the current static analysis technology of Android malicious code, and a detailed analysis of the format of APK which is the application name of Android platform executable file (dex). From the perspective of binary sequence, Dalvik VM file is syncopated in method, and these test samples are analyzed by automated DEX file parsing tools and Levenshtein distance algorithm, which can detect the malicious Android applications that contain the same signatures effectively. Proved by a large number of samples, this static detection system that based on signature sequences can't only detect malicious code quickly, but also has a very low rate of false positives and false negatives.
What problem does this paper attempt to address?