Then, it calls killProcess() to kill this process.
Finally, it calls getLaunchIntentForPackage() to
launch a replaced process in the system.
Repeatedly Sending Messages This malicious be-
havior repeatedly sends the data via SMS messages.
It is shown in the graph of Figure 8. The ma-
Landroid/content/SharedPreferences; ->getString
Landroid/telephony/SmsManager;
->getDefault
Ljava/util/Iterator;
->next
Landroid/telephony/SmsManager;
->sendTextMessage
Figure 8: The malicious API graph of the Android mali-
cious behavior of Repeatedly sending messages.
licious behavior is implemented as follows: The
malicious application first calls getString() in
SharedPreferences to get the values of the vari-
ables. Then, it calls getDefault() in SmsManager to
get the object to handle SMS message in the system.
Finally, it calls sendTextMessage() in SmsManager
to send the messages. Besides, it calls next() in
Iterator to get a list of messages for sending.
REFERENCES
ApkAndroidTool (2016). A tool for reverse engineering an-
droid apk files. https://ibotpeaches.github.io/Apktool.
Accessed: 2016-11-25.
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., and
Rieck, K. (2014). Drebin: Effective and explain-
able detection of android malware in your pocket. In
NDSS.
Burguera, I., Zurutuza, U., and Nadjm-Tehrani, S. (2011).
Crowdroid: behavior-based malware detection system
for android. In Proceedings of the 1st ACM workshop
on Security and privacy in smartphones and mobile
devices.
Canfora, G., Medvet, E., Mercaldo, F., and Visaggio, C. A.
(2015). Detecting android malware using sequences
of system calls. In Proceedings of the 3rd Interna-
tional Workshop on Software Development Lifecycle
for Mobile.
Chang, C.-C. and Lin, C.-J. (2011). Libsvm: A library for
support vector machines. ACM Transactions on Intel-
ligent Systems and Technology, 2. Software available
at http://www.csie.ntu.edu.tw/ cjlin/libsvm.
Dam, K. and Touili, T. (2019a). STAMAD: a static mal-
ware detector. In Proceedings of the 14th Interna-
tional Conference on Availability, Reliability and Se-
curity, ARES 2019, Canterbury, UK, August 26-29,
2019, pages 25:1–25:6. ACM.
Dam, K.-H.-T. and Touili, T. (2017a). Extracting android
malicious behaviors. In International Workshop on
FORmal methods for Security Engineering.
Dam, K.-H.-T. and Touili, T. (2017b). Learning android
malware. In Proceedings of the 12th International
Conference on Availability, Reliability and Security,
ARES ’17.
Dam, K. H. T. and Touili, T. (2019b). Stamad: A static
malware detector. In Proceedings of the 14th Interna-
tional Conference on Availability, Reliability and Se-
curity, ARES ’19, New York, NY, USA. Association
for Computing Machinery.
Dimja
ˇ
sevic, M., Atzeni, S., Ugrina, I., and Rakamaric, Z.
(2015). Android malware detection based on system
calls. University of Utah, Tech. Rep.
Gascon, H., Yamaguchi, F., Arp, D., and Rieck, K. (2013).
Structural detection of android malware using embed-
ded call graphs. In Proceedings of the 2013 ACM
workshop on Artificial intelligence and security, pages
45–54. ACM.
Jang, J.-w., Kang, H., Woo, J., Mohaisen, A., and Kim,
H. K. (2016). Andro-dumpsys: anti-malware system
based on the similarity of malware creator and mal-
ware centric information. Computers & security.
Kaspersky (2018). Internet security threat report.
https://securelist.com/it-threat-evolution-q3-2017-
statistics/83131/. Accessed: 2018-01-30.
Maiorca, D., Ariu, D., Corona, I., Aresu, M., and Giacinto,
G. (2015). Stealth attacks: An extended insight into
the obfuscation effects on android malware. Comput-
ers & Security.
Malik, S. and Khatter, K. (2016). System call analysis of
android malware families. Indian Journal of Science
and Technology.
McAfee (2019). Mcafee mobile threat re-
port. https://www.mcafee.com/enterprise/en-
us/assets/reports/rp-mobile-threat-report-2019.pdf.
Accessed: 2020-09-30.
Preda, M. D. and Maggi, F. (2016). Testing android mal-
ware detectors against code obfuscation: a systemati-
zation of knowledge and unified methodology. Jour-
nal of Computer Virology and Hacking Techniques.
Rastogi, V., Chen, Y., and Jiang, X. (2013). Droid-
chameleon: Evaluating android anti-malware against
transformation attacks. ASIA CCS ’13.
Song, F. and Touili, T. (2014). Model-checking for an-
droid malware detection. In Asian Symposium on Pro-
gramming Languages and Systems, pages 216–235.
Springer.
Symantec (2016). Internet security threat report.
https://www.symantec.com/securitycenter/threat-
report . Accessed: 2016-11-25.
Zheng, M., Lee, P. P. C., and Lui, J. C. S. (2013). ADAM:
An Automatic and Extensible Platform to Stress Test
Android Anti-virus Systems. DIMVA 2012.
MADLIRA: A Tool for Android Malware Detection
675