Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case

Irina Măriuca Asăvoae,Jorge Blasco,Thomas M. Chen,Harsha Kumara Kalutarage,Igor Muttik,Hoang Nga Nguyen,Markus Roggenbach,Siraj Ahmed Shaikh
DOI: https://doi.org/10.1007/978-3-319-59439-2_3
2017-01-01
Abstract:Malware has been a major problem in desktop computing for decades. With the recent trend towards mobile computing, malware is moving rapidly to smartphone platforms. “Total mobile malware has grown 151% over the past year”, according to McAfee®’s quarterly treat report in September 2016. By design, AndroidTM is “open” to download apps from different sources. Its security depends on restricting apps by combining digital signatures, sandboxing, and permissions. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps for which combined permissions allow them to carry out attacks. In this chapter we report on recent and ongoing research results from our ACID project which suggest a number of reliable means to detect collusion, tackling the aforementioned problems. We present our conceptual work on the topic of collusion and discuss a number of automated tools arising from it.
What problem does this paper attempt to address?