Abnormal application behavior in mobile can produce a number of
undesirable effects. An incorrect or insufficient implementation of application
lifecycle, memory related issues and malicious application might cause an
unexpected behavior of the application such as bad usability, not responding,
crashed and even data loss. Current analysis and detection of abnormal
applications behavior are still not comprehensive enough where behavior under
user visible failure category such as crash, “stopped unexpectedly” and “not
responding” received less attention by researchers. Furthermore, framework of
analysis technique has not been developed by researcher to investigate the
abnormal behavior in mobile application. Thus, in this paper we will study,
analyze and classify the possible issues in causing abnormal application
behavior and the existing techniques in identifying abnormal application
behavior.
Cite this paper
Zainuddin, N. B. , Abdollah, M. F. B. , Yusof, R. B. and Sahib, S. B. (2014). A Study on Abnormal Behaviour in Mobile Application. Open Access Library Journal, 1, e1229. doi: http://dx.doi.org/10.4236/oalib.1101229.
Costa-Montenegro, E.,
Barragáns-Martínez, A.B. and Rey-López, M. (2012) Which App? A Recommender System of Applications in Markets: Implementation
of the Service for Monitoring Users’ Interaction. Expert Systems with Applications, 39, 9367-9375. http://dx.doi.org/10.1016/j.eswa.2012.02.131
Zhao, M., Ge, F., Zhang,
T. and Yuan, Z. (2011) AntiMalDroid: An Efficient SVM-Based Malware. Communications in Computer and Information Science, 243, 158-166.
Giuffrida, C., Cavallaro,
L. and Tanenbaum, A.S. (2010) We Crashed, Now What? Proceedings of HotDep’10 Proceedings
of the 6th International Conference on
Hot Topics in System Dependability, 1-6.
Kim, S., Bettenburg, N. and Zimmermann, T. (2013) Predicting
Method Crashes. Proceedings of 6thIndia Software Engineering Conference, New
Delhi, 21-23 February 2013, 1-5.
Maji, A.K.,
Arshad, F.A., Bagchi, S. and Rellermeyer, J.S. (2012) An Empirical Study of the Robustness of Inter-Component
Communication in Android. 2012
42nd Annual IEEE/IFIP International Conference on Dependable Systems and
Networks (DSN),
Boston, 25-28 June 2012, 1-12.
Isohara, T., Takemori, K. and Kubota, A. (2011) Kernel-Based Behavior Analysis for Android Malware Detection.
20117th International Conference on
Computational Intelligence and Security (CIS), Hainan,
3-4 December 2011, 1011- 1015. http://dx.doi.org/10.1109/CIS.2011.226
Luo, H., He, G., Lin, X. and (Sherman)
Shen, X. (2012) Towards Hierarchical Security Framework for Smartphones. 2012 1st IEEE International Conference on
Communications in China (ICCC), Beijing, 15-17 August 2012, 214-219.
Delac, G., Silic,
M. and Krolo, J. (2011) Emerging Security Threats for Mobile Platforms. MIPRO 2011 Proceedings of
the 34th International Convention, Opatija, 23-27 May
2011, 1468-1473.
Park, J. and
Choi, B. (2012) Automated Memory Leakage Detection in Android Based Systems. International
Journal of Control Automation and Systems, 5, 35-42.
Shahriar,
H., North, S. and Mawangi, E. (2014) Testing of Memory Leak in Android Applications. IEEE 15th International Symposium on High
Assurance Systems Engineering, Miami Beach, 9-11 January 2014, 176-183.
Wei, X. (2013) ProfileDroid: Multi-Layer Profiling of Android Applications
Categories and Subject Descriptors. Proceedings of the 18th Annual
International Mobile Computing and Networking, Istanbul, 22-26 August 2012, 1-12.
Burguera, I. and
Zurutuza, U. (2011) Crowdroid: Behavior-Based Malware Detection System for Android. Proceedings
of the 18th ACM Computer and
Communications Security, Illnois, 17 October 2011, 15-25.
Shabtai,
A., Kanonov, U., Elovici, Y., Glezer, C. and Weiss, Y. (2011) “Andromaly”: A Behavioral Malware Detection Framework for Android Devices. Journal
of Intelligent Information Systems, 38, 161-190. http://dx.doi.org/10.1007/s10844-010-0148-x
Bl,
T., Batyuk, L., Schmidt, A., Camtepe, S.A., Albayrak, S. and Universit, T. (2010) An Android Application Sandbox System for Suspicious Software
Detection. 5th International
Conference on Malicious and Unwanted Software, France, 19-20 October 2010, 55-62.
Karami, M., Elsabagh,
M., Najafiborazjani, P. and Stavrou, A. (2013) Behavioral Analysis of Android Applications Using Automated
Instrumentation. IEEE 7th International Conference on Software
Security and Reliability Companion, Washington DC, 18-20 June 2013, 182-187.
Kim, H. (2011) MODELZ: Monitoring,
Detection, and Analysis of Energy-Greedy Anomalies in Mobile Handsets. IEEE
Transactions on Mobile Computing, 10, 968-981. http://dx.doi.org/10.1109/TMC.2010.245
Alazab,
M., Monsamy, V., Batten, L., Lantz, P. and Tian, R. (2012) Analysis of Malicious and Benign Android Applications. 32nd International Conference on
Distributed Computing Systems Workshops, Macau, 18-21 June 2013, 608- 616.
Thing, V.L.L., Subramaniam, P.P., Tsai, F.S. and Chua, T. (2011) Mobile Phone Anomalous Behaviour Detection for Real-Time
Information Theft Tracking. CYBERLAWS 2nd International
Conference on Technical and Legal Aspects of the e-Society, Guadeloupe, 23-28 February 2011, 7-11.
Guo, C., Zhang, J., Yan, J., Zhang, Z. and Zhang, Y. (2013) Characterizing and Detecting Resource Leaks
in Android Applications. 28th IEEE/ACM International Conference on
Automated Software Engineering, Silicon Valley, 11-15 November 2013, 389-398.
Yan, D. (2013) Systematic
Testing for Resource Leaks in Android Applications. IEEE 24th International Symposium on
Software Reliability Engineering, Pasadena, 4-7 November 2013, 411-420.
Franke, D. and Roy,
T. (2012) AndroLIFT: A Tool for Android Application Life Cycles. VALID
2012 4th International Conference on
Advancesin System Testing and Validation Lifecycle,Lisbon, 8 November 2012, 28-33.
Isohara,
T., Takemori,
K. and Kubota,
A. (2011) Kernel-Based Behavior Analysis
for Android Malware Detection. 7th International Conference on Computational
Intelligence Security, Hainan, 3-4 December 2011, 1011-1015. http://dx.doi.org/10.1109/CIS.2011.226