Behavior Analysis of Mobile Malware Based on Information Leakage

碩士 === 國立中山大學 === 資訊管理學系研究所 === 101 === With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile d...

Full description

Bibliographic Details
Main Authors: Wen-Ching Chiang, 江玟璟
Other Authors: Chia-Mei Chen
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/92590161671268091721
Description
Summary:碩士 === 國立中山大學 === 資訊管理學系研究所 === 101 === With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile device draw cracker’s attention, and malware made by cracker targets on it. When using malware, many users would suffer losses.   By using behavior analysis and tracking mobile application on emulator can understand what behavior is there with sensitive information within execution period. We observe the behavior in three parts, file, network and SMS. We would check if file and network’s behavior delivers the sensitive data. Also, we check the unusual SMS. Experimental results show that the approach has higher true positive on detection rate and lower false positive rate as compared to those permission based methods.