Academy & Industry Research Collaboration Center (AIRCC)

Volume 9, Number 6, May 2019

Mapping System Level Behaviors with Android APIs Via System Call Dependence Graphs

  Authors

Bin Zhao, JD.com Silicon Valley R&D Centre, USA

  Abstract

Due to Android’s open source feature and low barriers to entry for developers, millions of developers and third-party organizations have been attracted into the Android ecosystem. However, over 90% of mobile malware are found targeted on Android. Though Android provides multiple security features and layers to protect user data and system resources, there are still some over-privileged applications in Google Play Store or third-party Android app stores at wild. In this paper, we proposed an approach to map system level behavior and Android APIs, based on the observation that system level behaviors cannot be avoided but sensitive Android APIs could be evaded. To the best of our knowledge, our approach provides the first work to map system level behavior and Android APIs through System Call Dependence Graphs. The study also shows that our approach can effectively identify potential permission abusing, with almost negligible performance impact.

  Keywords

Behavior Mapping, System Call Dependence Graph, Privilege Escalation, Android APIs