%0 Journal Article %T Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A Hasan, Hayyan %A Tork Ladani, Behrouz %A Zamani, Bahman %D 2021 %\ 07/01/2021 %V 13 %N 2 %P 131-143 %! Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware %K Curious-Monkey %K Monkey %K Android %K Event Generator %K Android Malware %K Dynamic analysis %R 10.22042/isecure.2021.262208.589 %X Dynamic analysis is a prominent approach in analyzing the behavior of Android apps. To perform dynamic analysis, we need an event generator to provide proper environment for executing the app in an emulator. Monkey is the most popular event generator for Android apps in general, and is used in dynamic analysis of Android malware as well. Monkey provides high code coverage and yet high speed in generating events. However, in the case of malware analysis, Monkey suffers from several limitations. It only considers UI events but no system events, and because of random behavior in generating UI events, it may lose dropping the connectivity of the test environment during the analysis process. Moreover, it provides no defense against malware evasion techniques. In this paper, we try to enhance Monkey by reducing its limitations while preserving its advantages. The proposed approach has been implemented as an extended version of Monkey, named Curious-Monkey. Curious-Monkey provides facilities for handling system events, handling evasion techniques, and keeping the test environment's connectivity up during the analysis process. We conducted many experiments to evaluate the effectiveness of the proposed tool regarding two important criteria in dynamic malware analysis: the ability to trigger malicious payloads and the code coverage. In the evaluation process, we used the Evadroid benchmark and the AMD malware dataset. Moreover, we compared Curious-Monkey with Monkey and Ares tools. The results show that the Curious-Monkey provides better results in case of triggering malicious payloads, as well as better code coverage. %U https://www.isecure-journal.com/article_131659_9fdad1b8c4fd23d6fdff6f978040ca57.pdf