SherlockDroid: a research assistant to spot unknown malware in Android marketplaces

Research output: Contribution to journalArticlepeer-review

Abstract

With over 1,400,000 Android applications in Google Play alone, and dozens of different marketplaces, Android malware unfortunately have no difficulty to sneak in and silently spread. Known malware and their variants are nowadays quite well detected by anti-virus scanners. Nevertheless, the fundamentally new and unknown malware remain an issue. To assist research teams in the discovery of such new malware, we built an infrastructure, named SherlockDroid, whose goal is to filter out the mass of applications and only keep those which are the most likely to be malicious for future inspection by Anti-virus teams. SherlockDroid consists of marketplace crawlers, code-level property extractors and a classification tool named Alligator which decides whether the sample looks malicious or not, based on some prior learning. In our tests, we extracted properties and classified over 480K applications. During two crawling campaigns in July 2014 and October 2014, SherlockDroid crawled over 120K applications with the detection of one new malware, Android/Odpa.A!tr.spy, and two new riskware. With previous findings, this increases SherlockDroid and Alligator’s “Hall of Shame” to 8 malware and potentially unwanted applications.

Original languageEnglish
Pages (from-to)235-245
Number of pages11
JournalJournal of Computer Virology and Hacking Techniques
Volume11
Issue number4
DOIs
Publication statusPublished - 1 Nov 2015
Externally publishedYes

Keywords

  • Android
  • Classification
  • Malware
  • Security
  • Static analysis

Fingerprint

Dive into the research topics of 'SherlockDroid: a research assistant to spot unknown malware in Android marketplaces'. Together they form a unique fingerprint.

Cite this