Netinfo Security ›› 2016, Vol. 16 ›› Issue (4): 1-8.doi: 10.3969/j.issn.1671-1122.2016.04.001

• Orginal Article •     Next Articles

Research on the Technology of Malware Behavior Monitoring Based on LKM System Call Hijacking

Yong DING, Wei CAO, Senlin LUO()   

  1. Information System and Security & Countermeasures Experimental Center, Beijing Institute of Technology, Beijing 100081, China
  • Received:2016-03-04 Online:2016-04-20 Published:2020-05-13

Abstract:

Android operating system occupies most of the smart devices and has the largest number of users. But smartphone’s huge market value has also attracted the attention of hackers while bringing convenience to users. The black chain which uses malware as the main attack method can put users’ privacy and their property safety in dangerous situation. Therefore, study of the technology on Android malware detection has a very important theoretical value and practical significance. This paper gives a brief introduction on knowledge of Android malware, and proposes an Android application software dynamic behavior monitoring method based on LKM. This method hijacks and replaces the system call in the Linux kernel layer, and later runs in the form of services. It can monitor sending text messages, making phone calls, getting the phone number, network connections, privilege escalation and et al. Experimental results show that the monitoring accuracy rate of malicious behavior reaches to 93% and its performance overhead is less than 5%. Finally, this paper design and implement the dynamic behavior monitoring system based on the method. So, it has a high practical value.

Key words: behavior monitoring, LKM, malware, Android

CLC Number: