origin or market of origin, etc.) in order to gain in-
sight about the evolution of applications according to
the aforementioned metrics.
7 CONCLUSION
In this paper, we presented a fuzzy-like approach to
dynamic malware analysis on Android, where a given
parameter is modified in each new experiment to com-
pare variation in the application behavior. As ex-
pected, malware behavior varied with different con-
texts of user simulation. Thus, we were able to deter-
mine that only installing an application does not yield
interesting results in any case. Also, we have found
that basic user simulation generally triggers malware
behavior better than no simulation, the exception be-
ing leaks of sensitive data. Finally, malware tended
to have higher results for monitored metrics, even if
a divergence between malware dataset was recorded
for DNS and HTTP requests.
Building on these results, we plan to extend our
list of parameters to vary, such as the version of the
Android SDK for the emulator or the network con-
figuration of the sandbox, to further the comparison
of malware behavior. We also wish to increase the
number of malware samples in our dataset, in order to
cover a broader period of time, and classify those mal-
ware into families in order to trace parallels between
different applications of the same family, all in hope
of better understanding the global picture of malware
behavior.
REFERENCES
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., and
Rieck, K. (2014). DREBIN: Effective and Explain-
able Detection of Android Malware in Your Pocket.
In Proceedings of the 2013 Network and Distributed
System Security (NDSS) Symposium.
Arzt, S., Rasthofer, S., Christian Fritz and, E. B., Bar-
tel, A., Klein, J., Traon, Y. L., Octeau, D., and
McDaniel, P. (2014). FlowDroid: Precise Con-
text, Flow, Field, Object-Sensitive and Lifecyle-aware
Taint Analysis for Android Apps. In Proceedings of
the 35th ACM SIGPLAN Conference on Programming
Language Design and Implementation, pages 259–
269.
Au, K. W. Y., Zhou, Y. F., Huang, Z., and Lie, D. (2012).
Pscout: analyzing the android permission specifica-
tion. In Proceedings of the 2012 ACM conference on
Computer and communications security, pages 217–
228. ACM.
Bayer, U., Habibi, I., Balzarotti, D., Kirda, E., and Kruegel,
C. (2009). A View on Current Malware Behaviors. In
LEET.
Bayer, U., Kruegel, C., and Kirda, E. (2006). TTAnalyze: A
tool for analyzing malware. na.
Burguera, I., Zurutuza, U., and Nadjm-Tehrani, S. (2011).
CrowDroid: Behavior-Based Malware Detection Sys-
tem for Android. In Proceedings of the 1st ACM work-
shop on Security and privacy in smartphones and mo-
bile devices, pages 15–26.
Dunham, K., Hartman, S., Morales, J. A., Quintans, M., and
Strazzere, T. (2014). Android Malware And Analysis.
Auerbach Publications.
Eder, T., Rodler, M., Vymazal, D., and Zeilinger, M. (2013).
Ananas-a framework for analyzing android applica-
tions. In Availability, Reliability and Security (ARES),
2013 Eighth International Conference on, pages 711–
719. IEEE.
Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., Mc-
Daniel, P., and Sheth, A. N. (2014). TaintDroid: An
Information-Flow Tracking System for Realtime Pri-
vacy Monitoring on Smartphones. ACM Transactions
on Computer Systems (TOCS), 32(2).
Gagnon, F., Lafrance, F., Frenette, S., and Hall, S. (2014a).
AVP-An Android Virtual Playground. In DCNET,
pages 13–20.
Gagnon, F., Poisson, J., Frenette, S., Lafrance, F., Hall, S.,
and Michaud, F. (2014b). Blueprints of an Automated
Android Test-Bed. In E-Business and Telecommuni-
cations, pages 3–25. Springer.
Gonzalez, H., Stakhanova, N., and Ghorbani, A. A. (2014).
DroidKin: Lightweight Detection of Android Apps
Similarity. In Proceedings of the 10th International
Conference on Security and Privacy in Communica-
tion Networks.
Neugschwandtner, M., Lindorder, M., Fratantonio, Y.,
Veen, V. v. d., and Platzer, C. (2014). ANDRUBIS
- 1,000,000 Apps Later: A View on Current Android
Malware Behaviors. In Proceedings of the 3rd In-
ternational Workshop on Building Analysis Datasets
and Gathering Experience Returns for Security, pages
161–190.
PulseSecure (2015). 2015 Mobile Threat Report. Technical
report, Pulse Secure Mobile Threat Center.
Rastogi, V., Chen, Y., and Enck, W. (2013). AppsPlay-
ground: Automatic Security Analysis of Smartphone
Applications. In Proceedings of the ACM SIGSAC
Conference on Computer And Communications Secu-
rity, pages 209–220.
Reina, A., Fattori, A., and Cavallaro, L. (2013). A Sys-
tem Call-Centric Analysis and Stimulation Technique
to Automatically Reconstruct Android Malware Be-
haviors. In Proceedings of 6th European Workshop
on Systems Security.
Sasnauskas, R. and Regehr, J. (2014). Intent fuzzer: crafting
intents of death. In Proceedings of the 2014 Joint In-
ternational Workshop on Dynamic Analysis (WODA)
and Software and System Performance Testing, De-
bugging, and Analytics (PERTEA), pages 1–5. ACM.
Spreitzenbarth, M., Freiling, F., Echtler, F., Schreck, T.,
and Hoffmann, J. (2013). Mobile-Sandbox: Having a
A Comparative Study of Android Malware Behavior in Different Contexts
53