• Dr. M. Kathirvelu Professor, Department of ECE, GMR Institute of Technology, Rajam, Andhra Pradesh532127, India



Malware, Computer Security, Mobile Computing


Malware developers are progressively using advanced techniques to defeat malware detection tools. One such technique commonly observed in recent malware samples consists of hiding and obfuscating modules containing malicious functionality in places that static analysis tools overlook. In this paper, we describe a dynamic analysis approach for detecting such hidden or obfuscated malware components distributed as parts of an app package. The key idea is behavioral differences between the original app and a number of automatically generated versions of it, where a number of modifications (faults) have been carefully injected. The differential signature is analyzed through a pattern-matching process driven by rules that relate different types of hidden functionalities with patterns found in the signature. A thorough justification and a description of the proposed model are provided.


Download data is not yet available.


Arp.D, Spreitzenbarth.M, Ubner.M.H, Gascon.H, and Rieck.K, “Drebin: Effective and explainable detection of android malware in your pocket,” in Proc. NDSS, February 2014. DOI:

Egele.M, Scholte.T, Kirda.E, and Kruegel.C, “A survey on automated dynamic malware-analysis techniques and tools,” ACM Comput. Surv., vol. 44, no. 2, pp. 6:1–6:42, Mar. 2012. DOI:

Cai.L and Chen.H, “Touchlogger: inferring keystrokes on touch screen from smartphone motion,” in Proc. USENIX, ser. HotSec’11, Berkeley, CA, USA, 2011, pp. 9–9.

Christodorescu.M, Jha.S, Seshia.S, Song.D, and Bryant.R, “Semantics-aware malware detection,” in Security and Privacy, 2005 IEEE Symposium on, May 2005, pp. 32–46. DOI:

D. Perez and J. Pico, “A practical attack against GPRS/EDGE/UMTS/HSPA mobile data communications,” Black Hat DC, 2011.

G. Suarez-Tangil, J. E. Tapiador, P. Peris, and A. Ribagorda, ―Evolution, detection and analysis of malware for smart devices‖, IEEE Comms. Surveys & Tut., vol. 16, no. 2, pp. 961–987, May 2014. DOI:

L. K. Yan and H. Yin, ―Droidscope: seamlessly reconstructing the os and Dalvik semantic views for dynamic Android malware analysis, ‖ in Proc. USENIX, ser. Security ‘12. Berkeley, CA, USA:USENIX Association, 2012, pp. 29–29.

Shabtai, L.Tenenboim-Chekina, D.Mimran, L.Rokach, B.Shapira, Y.Elovici. Mobile malware detection through analysis of deviations in application network behavior‖., Department of Information Systems Engineering,2014. DOI:

Suarez-Tangil.G, Conti.M, Tapiador.J.E and PerisLopez.P, “Detecting targeted smartphone malware with behavior-triggering stochastic models,” in ESORICS 2014, ser. LNCS, vol. 8712. Springer International Publishing, 2014, pp. 183–201.

Y. Wang, K. Streff, and S. Raman, “Smartphone Security Challenges,” Computer (Long. Beach. Calif)., vol. 45, no. 12, pp. 52–58, Dec. 2012. DOI:

Z. Lackey and L. Miras, “Attacking SMS,” BlackHat 2009, 2009.




How to Cite

M. Kathirvelu. (2018). DETECTION OF HIDDEN FUNCTIONALITIES OF SMART PHONE MALWARE APP USING PATTERN-MATCHING TECHNIQUES . International Journal of Engineering Technologies and Management Research, 5(11), 107–116.