Share This Article:

A Study on Abnormal Behaviour in Mobile Application

Abstract PP. 1-6
DOI: 10.4236/oalib.1101229    1,610 Downloads   2,322 Views   Citations

ABSTRACT

Abnormal application behavior in mobile can produce a number of undesirable effects. An incorrect or insufficient implementation of application lifecycle, memory related issues and malicious application might cause an unexpected behavior of the application such as bad usability, not responding, crashed and even data loss. Current analysis and detection of abnormal applications behavior are still not comprehensive enough where behavior under user visible failure category such as crash, “stopped unexpectedly” and “not responding” received less attention by researchers. Furthermore, framework of analysis technique has not been developed by researcher to investigate the abnormal behavior in mobile application. Thus, in this paper we will study, analyze and classify the possible issues in causing abnormal application behavior and the existing techniques in identifying abnormal application behavior.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Zainuddin, N. , Abdollah, M. , Yusof, R. and Sahib, S. (2014) A Study on Abnormal Behaviour in Mobile Application. Open Access Library Journal, 1, 1-6. doi: 10.4236/oalib.1101229.

References

[1] Sasnauskas, R. and Regehr, J. (2014) Intent Fuzzer?: Crafting Intents of Death. 12th Int. Work. Dyn. Anal. + Work. Softw. Syst. Perform. Testing, Debugging, Anal., California, 22 July 2014, 1-5.
[2] Costa-Montenegro, E., Barragáns-Martínez, A.B. and Rey-López, M. (2012) Which App? A Recommender System of Applications in Markets: Implementation of the Service for Monitoring Users’ Interaction. Expert Systems with Applications, 39, 9367-9375.
http://dx.doi.org/10.1016/j.eswa.2012.02.131
[3] Chandola, V. (2009) Anomaly Detection?: A Survey. ACM Computing Surveys, 41, 1-72.
http://dx.doi.org/10.1145/1541880.1541882
[4] Zhao, M., Ge, F., Zhang, T. and Yuan, Z. (2011) AntiMalDroid?: An Efficient SVM-Based Malware. Communications in Computer and Information Science, 243, 158-166.
[5] Giuffrida, C., Cavallaro, L. and Tanenbaum, A.S. (2010) We Crashed, Now What?? Proceedings of HotDep’10 Proceedings of the 6th International Conference on Hot Topics in System Dependability, 1-6.
[6] Kim, S., Bettenburg, N. and Zimmermann, T. (2013) Predicting Method Crashes. Proceedings of 6th India Software Engineering Conference, New Delhi, 21-23 February 2013, 1-5.
[7] Maji, A.K., Arshad, F.A., Bagchi, S. and Rellermeyer, J.S. (2012) An Empirical Study of the Robustness of Inter-Component Communication in Android. 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Boston, 25-28 June 2012, 1-12.
[8] Isohara, T., Takemori, K. and Kubota, A. (2011) Kernel-Based Behavior Analysis for Android Malware Detection. 2011 7th International Conference on Computational Intelligence and Security (CIS), Hainan, 3-4 December 2011, 1011- 1015.
http://dx.doi.org/10.1109/CIS.2011.226
[9] Luo, H., He, G., Lin, X. and (Sherman) Shen, X. (2012) Towards Hier-archical Security Framework for Smartphones. 2012 1st IEEE International Conference on Communications in China (ICCC), Beijing, 15-17 August 2012, 214-219.
[10] Delac, G., Silic, M. and Krolo, J. (2011) Emerging Security Threats for Mobile Platforms. MIPRO 2011 Proceedings of the 34th International Convention, Opatija, 23-27 May 2011, 1468-1473.
[11] Pocatilu, P. (2011) Android Applications Security. Information Economics, 15, 163-172.
[12] Joshi, M. (2012) Analysis and Debugging of OEM’s.
[13] Peng, L., Peir, J.K., Prakash, T.K., Staelin, C., Chen, Y.K. and Koppelman, D. (2008) Memory Hierarchy Performance Measurement of Commercial Dual-Core Desktop Processors. Journal of Systems Architecture, 54, 816-828.
http://dx.doi.org/10.1016/j.sysarc.2008.02.004
[14] Park, J. and Choi, B. (2012) Automated Memory Leakage Detection in Android Based Systems. International Journal of Control Automation and Systems, 5, 35-42.
[15] Shahriar, H., North, S. and Mawangi, E. (2014) Testing of Memory Leak in Android Applications. IEEE 15th International Symposium on High Assurance Systems Engineering, Miami Beach, 9-11 January 2014, 176-183.
[16] Wei, X. (2013) ProfileDroid?: Multi-Layer Profiling of Android Applications Categories and Subject Descriptors. Proceedings of the 18th Annual International Mobile Computing and Networking, Istanbul, 22-26 August 2012, 1-12.
[17] Burguera, I. and Zurutuza, U. (2011) Crowdroid?: Behavior-Based Malware Detection System for Android. Proceedings of the 18th ACM Computer and Communications Security, Illnois, 17 October 2011, 15-25.
[18] Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C. and Weiss, Y. (2011) “Andromaly”: A Behavioral Malware Detection Framework for Android Devices. Journal of Intelligent Information Systems, 38, 161-190.
http://dx.doi.org/10.1007/s10844-010-0148-x
[19] Bl, T., Batyuk, L., Schmidt, A., Camtepe, S.A., Albayrak, S. and Universit, T. (2010) An Android Application Sandbox System for Suspicious Software Detection. 5th International Conference on Malicious and Unwanted Software, France, 19-20 October 2010, 55-62.
[20] Karami, M., Elsabagh, M., Najafiborazjani, P. and Stavrou, A. (2013) Behavioral Analysis of Android Applications Using Automated Instrumentation. IEEE 7th International Conference on Software Security and Reliability Companion, Washington DC, 18-20 June 2013, 182-187.
[21] Kim, H. (2011) MODELZ: Monitoring, Detection, and Analysis of Energy-Greedy Anomalies in Mobile Handsets. IEEE Transactions on Mobile Computing, 10, 968-981.
http://dx.doi.org/10.1109/TMC.2010.245
[22] Alazab, M., Monsamy, V., Batten, L., Lantz, P. and Tian, R. (2012) Analysis of Malicious and Benign Android Applications. 32nd International Conference on Distributed Computing Systems Workshops, Macau, 18-21 June 2013, 608- 616.
[23] Thing, V.L.L., Subramaniam, P.P., Tsai, F.S. and Chua, T. (2011) Mobile Phone Anomalous Behaviour Detection for Real-Time Information Theft Tracking. CYBERLAWS 2nd International Conference on Technical and Legal Aspects of the e-Society, Guadeloupe, 23-28 February 2011, 7-11.
[24] Guo, C., Zhang, J., Yan, J., Zhang, Z. and Zhang, Y. (2013) Characterizing and Detecting Resource Leaks in Android Applications. 28th IEEE/ACM International Conference on Automated Software Engineering, Silicon Valley, 11-15 November 2013, 389-398.
[25] Yan, D. (2013) Systematic Testing for Resource Leaks in Android Applications. IEEE 24th International Symposium on Software Reliability Engineering, Pasadena, 4-7 November 2013, 411-420.
[26] Franke, D. and Roy, T. (2012) AndroLIFT?: A Tool for Android Application Life Cycles. VALID 2012 4th International Conference on Advances in System Testing and Validation Lifecycle, Lisbon, 8 November 2012, 28-33.
[27] Isohara, T., Takemori, K. and Kubota, A. (2011) Kernel-Based Behavior Analysis for Android Malware Detection. 7th International Conference on Computational Intelligence Security, Hainan, 3-4 December 2011, 1011-1015.
http://dx.doi.org/10.1109/CIS.2011.226

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.