App behavioral analysis using system calls
Links to Fileshttps://ieeexplore.ieee.org/document/8116425
MetadataShow full item record
Type of Work6 pages
conference paper pre-print
Citation of Original PublicationMayank Jaiswal, Yasir Malik, Fehmi Jaafar, "Android gaming malware detection using system call analysis", Digital Forensic and Security (ISDFS) 2018 6th International Symposium on, pp. 1-5, 2018. DOI: 10.1109/INFCOMW.2017.8116425
RightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
© 2017 IEEE
UMBC Ebiquity Research Group
System calls provide an interface to the services made available by an operating system. As a result, any functionality provided by a software application eventually reduces to a set of fixed system calls. Since system calls have been used in literature, to analyze program behavior we made an assumption that analyzing the patterns in calls made by a mobile application would provide us insight into its behavior. In this paper, we present our preliminary study conducted with 534 mobile applications and the system calls made by them. Due to a rising trend of mobile applications providing multiple functionalities, our study concluded, mapping system calls to functional behavior of a mobile application was not straightforward. We use Weka tool with manually annotated application behavior classes and system call features in our experiments, to show that using such features achieves mediocre F1-measure at best. Thus leading to the conclusion that system calls were not sufficient features for mobile application behavior classification.