際際滷

際際滷Share a Scribd company logo
Droid swan
Presentation Structure
01
Why
DroidSwan?
02
Android and
Malware
03
Building
DroidSwan
05
Extracting
Features
06
Deriving
Feature set
07
DroidSwan
Working
04
Identifying
Features
08
DroidSwan
Performance
Why DroidSwan?
Of all mobile malware
applications target
Android platform
98%
Why DroidSwan?
Of all mobile malware
applications target
Android platform
Decrease in Number of
Malware samples
removed from PlayStore
98%
60%
Why DroidSwan?
338%
Of all mobile malware
applications target
Android platform
Decrease in Number of
Malware samples
removed from PlayStore
Increase in Number of
Malware samples on
Googles PlayStore
98%
60%
Malware and Android
Malware and Android
Surveillance
Malware and Android
Surveillance
Data Theft
Malware and Android
Surveillance
Data Theft Privacy Invasion
Malware and Android
Surveillance
Data Theft
Botnet Activity
Privacy Invasion
Malware and Android
Surveillance
Impersonation
Data Theft
Botnet Activity
Privacy Invasion
Building DroidSwan
Collecting
Malware and
Benign data set
Updating
classifier with
new data
Feature set
efficiency
analysis
Building
classifier model
Deriving feature
set
Identifying
crucial features
Identifying Features
Features
Suspicious
Permissions
Identifying Features
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Permissions Usage Trends in Malware Samples
Identifying Features
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Suspicious
API Combinations
Identifying Features
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Suspicious
API Combinations
Presence of
Executables
Identifying Features
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Suspicious
API Combinations
Manifest
Violation
Presence of
Executables
Features
Suspicious
Permissions
Suspicious
Permission
Combinations
Suspicious
API Combinations
Suspicious
Content URI
Manifest
Violation
Presence of
Executables
Identifying Features
80.57%
Content URI Usage Trends in Malware Samples
40%
78.8%
18%
Extracting Features
APK APK Parser
Suspicious
Permissions
Suspicious permission
Combinations
Extracting Features
APK APK Parser
Dexdump
Suspicious
Permissions
Suspicious permission
Combinations
Suspicious API
Combinations
Suspicious
Content URI
Manifest
Violation
Extracting Features
APK APK Parser
Dexdump
Jar
Disassembler
Executables in
resources
Suspicious
Permissions
Suspicious permission
Combinations
Suspicious API
Combinations
Suspicious
Content URI
Manifest
Violation
Deriving Feature Set
Three variations of feature set considered :
Weighted feature set with ED as a feature
Weighted feature set without ED as a feature
Non-Weighted feature set
Deriving Feature Set
Deriving Feature Set
DroidSwan Working
DroidSwan Performance
ROC curve
DroidSwan Performance
Recall Rate
DroidSwan Performance
Detection Rate
Babu Rajesh V has been
working for three years in
the field of mobile security
and malware analysis. His
areas of interests include
mobile security and
embedded security
Himanshu Pareek has around
six years of experience in
developing and design of
security solutions related to
small sized networks. He has
research papers published on
topics like malware detection
based on behaviour and
application modelling
Mahesh U Patil received
master degree in electronics
and communication. Presently
he is working as Principal
Technical Officer at CDAC. His
research interests include
Mobile Security and
Embedded Systems
Phaninder Reddy has been
working for two years in the
field of mobile security and
malware analysis. His areas
of interests include
machine learning and data
analytics
Our Team
Droid swan
Ad

Recommended

Insider theft detection
Insider theft detection
SumanthKommineni
Fraud and Malware Detection in Google Play by using Search Rank
Fraud and Malware Detection in Google Play by using Search Rank
ijtsrd
Hii assessing the_effectiveness_of_antivirus_solutions
Hii assessing the_effectiveness_of_antivirus_solutions
Anatoliy Tkachev
Top 5 cases of Data Breach caused by Human Error
Top 5 cases of Data Breach caused by Human Error
Cyware
Android App Security: What (not) to do!
Android App Security: What (not) to do!
Thomas Methlie
VirusTotal Threat Intelligence and DNIF Use Cases
VirusTotal Threat Intelligence and DNIF Use Cases
DNIF
Google android security_2018_report
Google android security_2018_report
malvvv
Three Simple Steps to Prevent Targeted Attacks
Three Simple Steps to Prevent Targeted Attacks
Argyle Executive Forum
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
IJNSA Journal
Androinspector a system for
Androinspector a system for
IJNSA Journal
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
IJNSA Journal
18-mobile-malware.pptx
18-mobile-malware.pptx
sundar110567
Bitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
Why Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and Observability
Eficode
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
SEAA 2022
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Shakas Technologies
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
tsysglobalsolutions
Icsm2011 syer
Icsm2011 syer
SAIL_QU
Android security
Android security
Hassan Abutair
MOTODEV App Validator
MOTODEV App Validator
Motorola Mobility - MOTODEV
Cyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdf
OKOKPROJECTS
IRJET- Android Malware Detection System
IRJET- Android Malware Detection System
IRJET Journal
Malware Detection in Android Applications
Malware Detection in Android Applications
ijtsrd
Bitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
EC-Council
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
AldoPalominoBravo

More Related Content

Similar to Droid swan (20)

ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
IJNSA Journal
Androinspector a system for
Androinspector a system for
IJNSA Journal
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
IJNSA Journal
18-mobile-malware.pptx
18-mobile-malware.pptx
sundar110567
Bitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
Why Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and Observability
Eficode
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
SEAA 2022
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Shakas Technologies
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
tsysglobalsolutions
Icsm2011 syer
Icsm2011 syer
SAIL_QU
Android security
Android security
Hassan Abutair
MOTODEV App Validator
MOTODEV App Validator
Motorola Mobility - MOTODEV
Cyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdf
OKOKPROJECTS
IRJET- Android Malware Detection System
IRJET- Android Malware Detection System
IRJET Journal
Malware Detection in Android Applications
Malware Detection in Android Applications
ijtsrd
Bitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
EC-Council
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
AldoPalominoBravo
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS
IJNSA Journal
Androinspector a system for
Androinspector a system for
IJNSA Journal
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
A FRAMEWORK FOR THE DETECTION OF BANKING TROJANS IN ANDROID
IJNSA Journal
18-mobile-malware.pptx
18-mobile-malware.pptx
sundar110567
Bitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
Why Serverless is scary without DevSecOps and Observability
Why Serverless is scary without DevSecOps and Observability
Eficode
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
A Preliminary Conceptualization and Analysis on Automated Static Analysis Too...
SEAA 2022
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Shakas Technologies
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
tsysglobalsolutions
Icsm2011 syer
Icsm2011 syer
SAIL_QU
Cyber Code Intelligence for Android Malware Detection.pdf
Cyber Code Intelligence for Android Malware Detection.pdf
OKOKPROJECTS
IRJET- Android Malware Detection System
IRJET- Android Malware Detection System
IRJET Journal
Malware Detection in Android Applications
Malware Detection in Android Applications
ijtsrd
Bitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
EC-Council
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
AldoPalominoBravo

Droid swan