UCL Discovery
UCL home » Library Services » Electronic resources » UCL Discovery

Anomaly-based exploratory analysis and detection of exploits in android mediaserver

Suarez-Tangil, G; Dash, SK; Garcia-Teodoro, P; Camacho, J; Cavallaro, L; (2018) Anomaly-based exploratory analysis and detection of exploits in android mediaserver. IET Information Security , 12 (5) pp. 404-413. 10.1049/iet-ifs.2017.0460. Green open access

[thumbnail of Dash_2018iet_exploits_segment.pdf]
Preview
Text
Dash_2018iet_exploits_segment.pdf - Accepted Version

Download (497kB) | Preview

Abstract

Smartphone platforms are becoming increasingly complex, which gives way to software vulnerabilities difficult to identify and that might allow malware developers to gain unauthorised privileges through technical exploitation. However, the authors maintain that these types of attacks indirectly renders a number of unexpected behaviours in the system that can be profiled. In this work, the authors present CoME , an anomaly-based methodology aiming at detecting software exploitation in Android systems. CoME models the normal behaviour of a given software component or service and it is capable of identifying any unanticipated behaviour. To this end, they first monitor the normal operation of a given exploitable component through lightweight virtual introspection. Then, they use a multivariate analysis approach to estimate the normality model and detect anomalies. They evaluate their system against one of the most critical vulnerable and widely exploited services in Android, i.e. the mediaserver. Results show that the proposed approach can not only provide a meaningful explanatory of discriminant features for illegitimate activities, but can also be used to accurately detect malicious software exploitations at runtime.

Type: Article
Title: Anomaly-based exploratory analysis and detection of exploits in android mediaserver
Open access status: An open access version is available from UCL Discovery
DOI: 10.1049/iet-ifs.2017.0460
Publisher version: http://dx.doi.org/10.1049/iet-ifs.2017.0460
Language: English
Additional information: This version is the author accepted manuscript. For information on re-use, please refer to the publisher’s terms and conditions.
Keywords: Science & Technology, Technology, Computer Science, Information Systems, Computer Science, Theory & Methods, Computer Science, smart phones, computer network security, computer crime, program diagnostics, invasive software, unauthorised privileges, technical exploitation, unexpected behaviours, detecting software exploitation, Android systems, CoME models the normal behaviour, unanticipated behaviour, normal operation, lightweight virtual introspection, multivariate analysis approach, normality model, critical vulnerable services, widely exploited services, malicious software exploitations, smartphone platforms, software vulnerabilities, malware developers, software component, anomaly-based exploratory analysis, Android mediaserver, exploitable component, EVOLUTION, SYSTEMS, SUPPORT
UCL classification: UCL
UCL > Provost and Vice Provost Offices > UCL BEAMS
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science
UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science
URI: https://discovery.ucl.ac.uk/id/eprint/10056966
Downloads since deposit
106Downloads
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item