Automated malware analysis service using mobile virtual box

  • PDF / 448,079 Bytes
  • 11 Pages / 595 x 791 pts Page_size
  • 54 Downloads / 172 Views

DOWNLOAD

REPORT


Automated Malware Analysis Service Using Mobile Virtual Box

Jang Il Kim, Kyung Shin Kim, Ki Won Nam, Yong-Gyu Jung

Received: 21 January 2016 / Accepted: 11 May 2016 / Published: 24 June 2016 © The Society of Service Science and Springer 2016

ABSTRACT Recently Smartphone is widely used around the world, and over 50% of mobile subscribers are using Smartphone in USA. 24 million people are identified as Smartphone sub-scribers. However, Smartphone has a vulnerability to security, and security-related incidents make damages of Smartphone. Precautions have been made for the infection of most of the damage occurring except for the case of the expert by way of conventional post-countermeasure. In this paper, we propose mobile-based malware analysis service that applies virtualization technology to analyze the behavior. In addition, we implement system that can be prepared in advance to buy a security from a user perspective.

KEYWORDS Security, Malware, Mobile Virtualization, Malware Analysis.

Jang Il Kim Dept. of Medical IT and Marketing, Eulji University, Korea e-mail: [email protected] Kyung Shin Kim Dept. of Mobile Security, Chungkang College of Cultural Industries, Korea e-mail: [email protected] Ki Won Nam Dept. of Early Childhood Education, Chung Ang University, Korea e-mail: [email protected] Yong-Gyu Jung ( ), corresponding author Dept. of Medical IT and Marketing, Eulji University, Korea e-mail: [email protected]

74 Jang Il Kim, Kyung Shin Kim, Ki Won Nam, Yong-Gyu Jung

1. INTRODUCTION Recently Smartphone is rapidly increased with surge in worldwide. According to 2012 criteria, over 50% of mobile subscribers are using Smartphone in the United States. In the country, they are using smart phones at 47.7% of total mobile subscribers by 24,794,337 people identified by the same time, the domestic Smartphone subscribers, new subscribers in 2012 one month could reach the 923,860 people. We choose an open structure with the Features of the “platform open source” and “a wide range of applications spread path” to the fast market expansion has obtained more than 50% market share as a result of these, one of the Android Smartphone platform. However, features that facilitate creation and dissemination of malicious code also imported, five people were given too vulnerable to malicious code that Android is an open structure. Actual attack most of the Android mobile malware has increased rapidly. As malicious code is a way to analyze malware behavior analysis is a method of analysis of malicious code on a PC using virtualization technology in the way of analyzing the behavior after incubation malware using multiple hard disk space directly from a hard past It was developed in such a way that the. However, analysis of the behavior does not take advantage of virtualization technology to analyze the way in mobile malware samples utilizing data from the offline analysis and execution, forgery detectors is performed using the method and integrity verification techniques are preventive measures to avoid in fact, the current te