Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aubrey-Derrick Schmidt is active.

Publication


Featured researches published by Aubrey-Derrick Schmidt.


international conference on malicious and unwanted software | 2010

An Android Application Sandbox system for suspicious software detection

Thomas Bläsing; Leonid Batyuk; Aubrey-Derrick Schmidt; Seyit A. Camtepe; Sahin Albayrak

Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of computational power, sensors and communication. Emerging new features of mobile devices give opportunity to new threats. Android is one of the newer operating systems targeting smartphones. While being based on a Linux kernel, Android has unique properties and specific limitations due to its mobile nature. This makes it harder to detect and react upon malware attacks if using conventional techniques. In this paper, we propose an Android Application Sandbox (AASandbox) which is able to perform both static and dynamic analysis on Android programs to automatically detect suspicious applications. Static analysis scans the software for malicious patterns without installing it. Dynamic analysis executes the application in a fully isolated environment, i.e. sandbox, which intervenes and logs low-level interactions with the system for further analysis. Both the sandbox and the detection algorithms can be deployed in the cloud, providing a fast and distributed detection of suspicious software in a mobile software store akin to Googles Android Market. Additionally, AASandbox might be used to improve the efficiency of classical anti-virus applications available for the Android operating system.


international conference on communications | 2009

Static Analysis of Executables for Collaborative Malware Detection on Android

Aubrey-Derrick Schmidt; Rainer Bye; Hans-Gunther Schmidt; Jan Hendrik Clausen; Osman Kiraz; Kamer Ali Yüksel; Seyit A. Camtepe; Sahin Albayrak

Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.


international conference on malicious and unwanted software | 2009

Smartphone malware evolution revisited: Android next target?

Aubrey-Derrick Schmidt; Hans-Gunther Schmidt; Leonid Batyuk; Jan Hendrik Clausen; Seyit A. Camtepe; Sahin Albayrak; Can Yildizli

Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. Android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform1. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.


mobile wireless middleware operating systems and applications | 2009

Developing and benchmarking native Linux applications on Android

Leonid Batyuk; Aubrey-Derrick Schmidt; Hans-Gunther Schmidt; Seyit A. Camtepe; Sahin Albayrak

Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment.


workshop in information security theory and practice | 2010

A probabilistic diffusion scheme for anomaly detection on smartphones

Tansu Alpcan; Christian Bauckhage; Aubrey-Derrick Schmidt

Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given the battery, computing power, and bandwidth limitations inherent to such mobile devices, detection of malware on them is a research challenge that requires a different approach than the ones used for desktop/laptop computing. We present a novel probabilistic diffusion scheme for detecting anomalies possibly indicating malware which is based on device usage patterns. The relationship between samples of normal behavior and their features are modeled through a bipartite graph which constitutes the basis for the stochastic diffusion process. Subsequently, we establish an indirect similarity measure among sample points. The diffusion kernel derived over the feature space together with the Kullback-Leibler divergence over the sample space provide an anomaly detection algorithm. We demonstrate its applicability in two settings using real world mobile phone data. Initial experiments indicate that the diffusion algorithm outperforms others even under limited training data availability.


School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty | 2008

Enhancing security of linux-based android devices

Aubrey-Derrick Schmidt; Hans-Gunther Schmidt; Jan Hendrik Clausen; Kamer Ali Yüksel; Osman Kiraz; Seyit A. Camtepe; Sahin Albayrak


School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty | 2010

Static smartphone malware detection

Aubrey-Derrick Schmidt; Seyit A. Camtepe; Sahin Albayrak


MobileWireless Middleware, Operating Systems, and Applications. Second International Conference, Mobilware 2009, Berlin, Germany, April 28-29, 2009 Proceedings | 2012

Developing and Benchmarking Native Linux Applications on Android

Leonid Batyuk; Aubrey-Derrick Schmidt; Hans-Gunther Schmidt; Ahmet Camtepe; Sahin Albayrak


Archive | 2011

Detection of Smartphone Malware.

Aubrey-Derrick Schmidt


School of Electrical Engineering & Computer Science; Information Security Institute; Science & Engineering Faculty | 2008

Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft

Aubrey-Derrick Schmidt; Rainer Bye; Hans-Gunther Schmidt; Kamer Ali Yüksel; Osman Kiraz; Jan Hendrik Clausen; Karsten Raddatz; Seyit A. Camtepe; Sahin Albayrak

Collaboration


Dive into the Aubrey-Derrick Schmidt's collaboration.

Top Co-Authors

Avatar

Sahin Albayrak

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Seyit A. Camtepe

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Hans-Gunther Schmidt

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Jan Hendrik Clausen

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Leonid Batyuk

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Karsten Raddatz

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar

Rainer Bye

Technical University of Berlin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge