Automated Identification of Installed Malicious Android Applications
February 2013
Mark D. Guido, The MITRE Corporation
Jared K. Ondricek, The MITRE Corporation
Justin N. Grover, The MITRE Corporation
David M. Wilburn, The MITRE Corporation
Thanh N. Nguyen, The MITRE Corporation
Andrew N. Hunt, The MITRE Corporation
ABSTRACT
Increasingly, Android smartphones are becoming more pervasive within the government and industry, despite the limited ways to detect malicious applications installed to these phones' operating systems. Although enterprise security mechanisms are being developed for use on Android devices, these methods cannot detect previously unknown malicious applications. As more sensitive enterprise information becomes available and accessible on these smartphones, the risk of data loss inherently increases. A malicious application's actions could potentially leave sensitive data exposed with little recourse. Without an effective corporate monitoring solution in place for these mobile devices, organizations will continue to lack the ability to determine when a compromise has occurred.
The Periodic Mobile Forensics research project applies traditional digital forensic techniques to monitor and audit Android smartphones. The project aims at ascertaining new ways of identifying malicious Android applications and ultimately attempts to improve the state of enterprise smartphone monitoring. A client, server, database, and analysis framework was developed and tested using real mobile malware. The results are promising in that the developed detection techniques identify changes to important system partitions; recognize file system changes, including file deletions; and find persistence and triggering mechanisms in newly installed applications. It is believed that these detection techniques should be performed by enterprises to identify malicious applications affecting their phone infrastructure.

Additional Search Keywords
android smart phones, malicious androids, malicious android applications, cyber attack detection, data loss risk, corporate computer monitoring, cybersecurity, Periodic Mobile Forensics, PMF, forensic techniques, smartphone monitoring, Mobile Computing Security Initiative, MOCSI
|