A Review of Static Detection Methods for Android Malicious Application

被引:0
作者
Pan J. [1 ]
Cui Z. [1 ]
Lin G. [1 ]
Chen X. [2 ]
Zheng L. [1 ]
机构
[1] Computer School, Beijing Information Science and Technology University, Beijing
[2] School of Information Science and Technology, Nantong University, Jiangsu, Nantong
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2023年 / 60卷 / 08期
基金
中国国家自然科学基金;
关键词
Android malware; application programming interface (API); opcode; permission; static detection;
D O I
10.7544/issn1000-1239.202220297
中图分类号
学科分类号
摘要
Due to the openness of the Android system and the diversity of the third-party application markets, Android system has achieved a high market share while brought huge risks. As a result, Android malware emerge endlessly and spread widely, which seriously threaten users’ privacy and economic security. How to effectively detect Android malware has been widely concerned by researchers. According to whether the application is executed or not, the existing malware detection methods are divided into static detection and dynamic detection. Between the two, the static detection methods outperform the dynamic detection methods in terms of efficiency and code coverage, Drebin and other static detection tools have been widely used. We systematically review the research progress in the field of static Android malware detection. First, the static features of Android applications are introduced. Then, according to different static features used for detecting Android malware, the static Android malware detection methods are classified into three categories: permissions, application programming interface(API), and opcode based approaches, and the Android application data sets and indicators commonly used to evaluate the detection performance of Android malware are summarized. Finally, potential research directions of static Android malware detection techniques in the future are discussed, which provides references for researchers in related directions. © 2023 Science Press. All rights reserved.
引用
收藏
页码:1875 / 1894
页数:19
相关论文
共 117 条
[1]  
Statistical report on the development of Internet in China [EB/OL], (2022)
[2]  
Smartphone market share [EB/OL]
[3]  
2020 China Internet network security report
[4]  
Bad binder: Android in the wild exploit [EB/OL], (2019)
[5]  
Hasan H, Ladani B T, Zamani B., MEGDroid: A model-driven event generation framework for dynamic Android malware analysis, Information and Software Technology, 135, (2021)
[6]  
Pingbin Feng, Jianfen Ma, Sun Cong, Et al., A novel dynamic Android malware detection system with ensemble learning[J], IEEE Access, 6, pp. 30996-31011, (2018)
[7]  
Arp D, Spreitzenbarth M, Hubner M, Et al., Drebin: Effective and explainable detection of Android malware in your pocket[C], Proc of the 14th Symp of Network & Distributed System Security Symp, pp. 23-26, (2014)
[8]  
Samra A A A, Qunoo H N, Al-Rubaie F, Et al., A survey of static Android malware detection techniques[C/OL], Proc of the 7th IEEE Palestinian Int Conf on Electrical and Computer Engineering (PICECE), (2019)
[9]  
Bayazit E C, Sahingoz O K, Dogan B., Malware detection in Android systems with traditional machine learning models: A survey[C/OL], Proc of the 2020 Int Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
[10]  
Desnos A, Gueguen G, Bachmann S., Androguard, (2018)