Summary: | 碩士 === 國立中山大學 === 資訊管理學系研究所 === 101 === With the advance of science and technology, mobile devices have been more powerful and no less from personal computer. There are more people using mobile device working, surfing the internet or other forms of entertainment. The user information on the mobile device draw cracker’s attention, and malware made by cracker targets on it. When using malware, many users would suffer losses.
By using behavior analysis and tracking mobile application on emulator can understand what behavior is there with sensitive information within execution period. We observe the behavior in three parts, file, network and SMS. We would check if file and network’s behavior delivers the sensitive data. Also, we check the unusual SMS. Experimental results show that the approach has higher true positive on detection rate and lower false positive rate as compared to those permission based methods.
|