ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1506.05217
120
42
v1v2 (latest)

Dexteroid: Detecting Malicious Behaviors in Android Apps Using Reverse-Engineered Life Cycle Models

Computers & security (Comput. Secur.), 2015
17 June 2015
Mohsin Junaid
Donggang Liu
D. Kung
ArXiv (abs)PDFHTML
Abstract

The number of Android malware has increased greatly during the last few years. Static analysis is widely used in detecting such malware by analyzing the code without execution. However, the effectiveness of current tools depends on the app model as well as the malware detection algorithm that analyzes the app model. If the model and/or the algorithm is inadequate, then sophisticated attacks that are triggered by a specific sequence of events will not be detected. This paper presents the Dexteroid framework, which is based on reverse-engineered life cycle models that accurately capture the behaviors of Android components. Furthermore, Dexteroid systematically derives event sequences from the models, and uses them to detect attacks launched by specific ordering of events. A prototype implementation of Dexteroid has been used to conduct a series of experiments, which show that the proposed framework is effective and efficient in terms of precision, recall, and execution time.

View on arXiv
Comments on this paper