Serviceeinschränkungen vom 12.-22.02.2026 - weitere Infos auf der UB-Homepage

Treffer: SherlockDroid, an Inspector for Android Marketplaces

Title:
SherlockDroid, an Inspector for Android Marketplaces
Contributors:
System on Chip (LabSoC), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom Paris (IMT)-Télécom Paris-Institut Mines-Télécom Paris (IMT)-Télécom Paris, Département Communications & Electronique (COMELEC), Télécom ParisTech
Source:
Hack.lu ; https://hal.telecom-paris.fr/hal-02412084 ; Hack.lu, Oct 2014, Luxembourg, Luxembourg
Publisher Information:
HAL CCSD
Publication Year:
2014
Collection:
Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
Subject Geographic:
Document Type:
Konferenz conference object
Language:
English
Accession Number:
edsbas.AE920F21
Database:
BASE

Weitere Informationen

International audience ; With over 1,200,000 Android applications in Google Play alone, and dozens of different marketplaces, Android malware unfortunately have no difficulty to sneak in and silently spread. This puts a high pressure on antivirus teams. To try and spot new malware instances, we have built an infrastructure, named SherlockDroid, whose goal is to filter out the mass of applications and only keep those which are the most likely to be malicious for future inspection by Anti-virus teams.SherlockDroid consists of marketplace crawlers, code-level property extractors and a classification tool named Alligator which decides whether the sample looks malicious or not, based on some prior learning.During our tests, we have extracted properties and classified over 480k applications. Since the beginning of July 2014, SherlockDroid has crawled 88,369 applications with the detection of one new malware, Android/Odpa.A!tr.spy, and one new riskware. With previous findings, this increases SherlockDroid and Alligator’s “Hall of Shame” to 7 malware and potentially unwanted applications.