Presentation 2013-03-25
Observing DNS Communication of Android Malware using Sandbox Analysis
Fumihiro KANEI, Katsunari YOSHIOKA, Tsutomu MATSUMOTO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) With the spread of smartphones in recent years, Android OS has become popular. 0n the other hand, malware targeting the Android devices is increasing every year and damage from them has become serious. In many cases, name resolution is performed and DNS communication occurs when Android malware communicate with other hosts. Therefore, we may be able to detect the mobile device that is infected with the malware by observing the DNS communication. In this paper, we propose a method to observe these DNS communication of Android malware using sandbox analysis.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Android / Dynamic Analysis / DNS
Paper # ICSS2012-62
Date of Issue

Conference Information
Committee ICSS
Conference Date 2013/3/18(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information and Communication System Security (ICSS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Observing DNS Communication of Android Malware using Sandbox Analysis
Sub Title (in English)
Keyword(1) Android
Keyword(2) Dynamic Analysis
Keyword(3) DNS
1st Author's Name Fumihiro KANEI
1st Author's Affiliation ()
2nd Author's Name Katsunari YOSHIOKA
2nd Author's Affiliation
3rd Author's Name Tsutomu MATSUMOTO
3rd Author's Affiliation
Date 2013-03-25
Paper # ICSS2012-62
Volume (vol) vol.112
Number (no) 499
Page pp.pp.-
#Pages 6
Date of Issue