Currently, in the smartphone market, Android is the platform with the highest share. Due to this popularity and also to its open source nature, Android-based smartphones are now an ideal target for attackers. Since the number of malware designed for Android devices is increasing fast, Android users are looking for security solutions aimed at preventing malicious actions from damaging their smartphones. In this paper, we describe MADAM, a Multi-level Anomaly Detector for Android Malware. MADAM concurrently monitors Android at the kernel-level and user-level to detect real malware infections using machine learning techniques to distinguish between standard behaviors and malicious ones. The rst prototype of MADAM is able to detect several real malware found in the wild. The device usability is not a ected by MADAM due to the low number of false positives generated after the learning phase

MADAM: A Multi-Level Anomaly Detector for Android Malware

Fabio Martinelli;Andrea Saracino;Daniele Sgandurra
2012

Abstract

Currently, in the smartphone market, Android is the platform with the highest share. Due to this popularity and also to its open source nature, Android-based smartphones are now an ideal target for attackers. Since the number of malware designed for Android devices is increasing fast, Android users are looking for security solutions aimed at preventing malicious actions from damaging their smartphones. In this paper, we describe MADAM, a Multi-level Anomaly Detector for Android Malware. MADAM concurrently monitors Android at the kernel-level and user-level to detect real malware infections using machine learning techniques to distinguish between standard behaviors and malicious ones. The rst prototype of MADAM is able to detect several real malware found in the wild. The device usability is not a ected by MADAM due to the low number of false positives generated after the learning phase
2012
Istituto di informatica e telematica - IIT
Inglese
Computer Network Security
6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012
240
250
11
978-3-642-33703-1
Springer-Verlag
Berlin
GERMANIA
Sì, ma tipo non specificato
October 17-19, 2012
St. Petersburg, Russia
Intrusion detection
ID_PUMA; /cnr.iit/2012-A2-022
4
none
Dini, Gianluca; Martinelli, Fabio; Saracino, Andrea; Sgandurra, Daniele
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/128071
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 177
  • ???jsp.display-item.citation.isi??? ND
social impact