Abstract
Since mobile application market drastically extended, there have been many problems related to proliferative malicious applications that leak user’s private information stored in own smart device. In Korea, government strives to protect smart device users from these problems and to establish legal basis through ‘Privacy Act’ as a preceding step but studies on analysis models and verification tools for mobile application have not yet much developed. The purpose of this research is to suggest an analysis system to prevent propagation of harmful applications, which compromise the user’s personal information, by extracting signatures from malicious code samples detected in Android. Maliciousness of the applications has determined by learning their parsing information on the components such as DEX, Manifest, SO etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Kim GH (2011) Korea communication commission annual report, EKCC
Seo SH (2010) Smartphone security threats and response strategies. TTA J 132:44–48
Nachenberg C (2011) A window into mobile device security, Symantec
McAfee Labs (2011) McAfee threats report: fourth quarter 2010, McAfee
Kim HS (2010) Monthly report of Ahnlab, AhnLab
Kim IS (2010) Analysis method and response guide of mobile malwares, KICS 35(4)
Kim YM (2010) A study on development of smartphone based malicious code collection and analysis platform, KISA
Ryou JC (2010) Study of malware detection based mobile OS, KISA
Lim SJ (2010) A study on protection model of propagation through smartphone malware analysis. KIAS 10(1):1–8
Reinbacher T, Horauer M, Schlich B, Brauer Jorg, Scheuer F (2011) Model checking embedded software of an industrial knitting machine. IJITCC 1(2):186–205
Li T, Yu F, Lin Y, Kong X, Yu Y (2011) Trusted computing dynamic attestation using a static analysis based behaviour model. JoC 2(1):61–68
Liang W-Y, Lai P-T, Chiou CW (2011) An energy conservation DVFS algorithm for the Android operating system. JoC 1(1):93–100
Xie B, Kumar A, Zhao D, Reddy R, He B (2011) On secure communication in integrated heterogeneous wireless networks. IJITCC 1(1):4–23
Acknowledgments
This work was supported by the IT R&D program of MKE/KEIT [KI0038421, Develop method and apparatus for diagnosing malicious mobile program and protecting solution].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Kim, S., Cho, J.I., Myeong, H.W., Lee, D.H. (2012). A Study on Static Analysis Model of Mobile Application for Privacy Protection. In: J. (Jong Hyuk) Park, J., Chao, HC., S. Obaidat, M., Kim, J. (eds) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol 114. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2792-2_50
Download citation
DOI: https://doi.org/10.1007/978-94-007-2792-2_50
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2791-5
Online ISBN: 978-94-007-2792-2
eBook Packages: EngineeringEngineering (R0)