normal behavior at system level for an Android appli-
cation. To verify if this model is complete enough to
capture the real behavior of benign Android applica-
tions we compared it with a large corpus of executions
obtained from benign applications. In a second part,
we led experiments on malicious applications and
showed that this approach easily spot sophisticated
malware such as ransomware, rootkits, data erasers,
app installers or random chosen malware.
ACKNOWLEDGEMENTS
This work has received a French government sup-
port granted to the COMIN Labs excellence labora-
tory and managed by the National Research Agency
in the ”Investing for the Future” program under refer-
ence ANR-10-LABX-07-01.
REFERENCES
Abraham, A., Andriatsimandefitra, R., Brunelat, A., La-
lande, J.-F., and Viet Triem Tong, V. (2015). Grod-
dDroid: a Gorilla for Triggering Malicious Behaviors.
In 10th International Conference on Malicious and
Unwanted Software, pages 119–127, Fajardo, Puerto
Rico. IEEE Computer Society.
Afonso, V. M., de Amorim, M. F., Gr
´
egio, A. R. A., Jun-
quera, G. B., and de Geus, P. L. (2014). Identify-
ing Android malware using dynamically obtained fea-
tures. Journal of Computer Virology and Hacking
Techniques.
Andriatsimandefitra, R. and Viet Triem Tong, V. (2014).
Capturing Android Malware Behaviour using System
Flow Graph. In The 8th International Conference on
Network and System Security, Xi’an, China.
Blasing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S. A.,
and Albayrak, S. (2010). An Android Application
Sandbox system for suspicious software detection. In
5th International Conference on Malicious and Un-
wanted Software, pages 55–62. IEEE Computer Soci-
ety.
Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., Mc-
Daniel, P., and Sheth, A. N. (2010). Taintdroid: An
information-flow tracking system for realtime privacy
monitoring on smartphones. In Proceedings of the
9th USENIX Conference on Operating Systems De-
sign and Implementation, OSDI’10, pages 393–407,
Berkeley, CA, USA. USENIX Association.
Kiss, N., Lalande, J.-F., Leslous, M., and Viet Triem Tong,
V. (2016). Kharon dataset: Android malware under
a microscope. In The Learning from Authoritative Se-
curity Experiment Results workshop, San Jose, United
States. The USENIX Association.
Lin, Y.-D., Lai, Y.-C., Chen, C.-H., and Tsai, H.-C. (2013).
Identifying android malicious repackaged applica-
tions by thread-grained system call sequences. Com-
puters & Security, 39:340–350.
Neuner, S., Veen, V. V. D., and Lindorfer, M. (2014). En-
ter Sandbox: Android Sandbox Comparison. In 3rd
IEEE Mobile Security Technologies Workshop, San
Jose, CA.
Schmidt, A.-d., Schmidt, H.-g., Clausen, J., Camtepe, A.,
and Albayrak, S. (2008). Enhancing Security of
Linux-based Android Devices. In 15th International
Linux Kongress.
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., and Weiss,
Y. (2012). ”Andromaly”: A behavioral malware de-
tection framework for android devices. Journal of In-
telligent Information Systems, 38(1):161–190.
Wong, M. Y. and Lie, D. (2016). IntelliDroid: A Targeted
Input Generator for the Dynamic Analysis of Android
Malware. In The Network and Distributed System
Security Symposium, number February, pages 21–24,
San Diego, USA. The Internet Society.
Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., and Wu,
K.-P. (2012). DroidMat: Android Malware Detection
through Manifest and API Calls Tracing. Seventh Asia
Joint Conference on Information Security, pages 62–
69.
Zheng, C., Zhu, S., Dai, S., Gu, G., Gong, X., Han, X., and
Zou, W. (2012). SmartDroid: an automatic system for
revealing UI-based trigger conditions in android ap-
plications. In Second ACM workshop on Security and
privacy in smartphones and mobile devices, page 93,
Raleigh, NC, USA. ACM Press.
Zhou, Y., Wang, Z., Zhou, W., and Jiang, X. (2012). Hey,
you, get off of my market: Detecting malicious apps
in official and alternative android markets. In NDSS,
volume 25, pages 50–52.
Information Flows at OS Level Unmask Sophisticated Android Malware
585