DroidMD: An efficient and scalable Android malware detection approach at source code level

被引:5
作者
Akram J. [1 ]
Mumtaz M. [1 ]
Jabeen G. [1 ]
Luo P. [1 ]
机构
[1] The Key State Laboratory of Information Security, School of Software Engineering, Tsinghua University
关键词
Android apps re-usability; Android evolution; Android software; Code clones; DroidMD; Malware detection; Mobile security;
D O I
10.1504/IJICS.2021.116310
中图分类号
学科分类号
摘要
Security researchers and anti-virus industries have speckled stress on an Android malware, which can actually damage your phones and threatens the Android markets. In this paper, we propose and develop DroidMD, a scalable self-improvement based tool, based on auto optimisation of signature set, which detect malicious apps in the market at source code level. A prototype has been developed tested and implemented to detect malware in applications. We implement and evaluate our approach on almost 30,000 applications including 27,000 benign and 3,670 malware applications. DroidMD detects malware in different applications at partial level and full level. It analyses only the applications code, which increase its reliability. Our evaluation of DroidMD demonstrates that our approach is very efficient in detecting malware at large scale with high accuracy of 95.5%. © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:299 / 321
页数:22
相关论文
共 63 条
[1]  
Akram J., Shi Z., Mumtaz M., Luo P., Droidcc: a scalable clone detection approach for Android applications to detect similarity at source code level, IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), pp. 100-105, (2018)
[2]  
Alam S., Qu Z., Riley R., Chen Y., Rastogi V., Droidnative: automating and optimizing detection of Android native code malware variants, Computers & Security, 65, pp. 230-246, (2017)
[3]  
Alam S., Riley R., Sogukpinar I., Carkaci N., Droidclone: detecting Android malware variants by exposing code clones, Sixth International Conference on Digital Information and Communication Technology and its Applications (DICTAP), pp. 79-84, (2016)
[4]  
The Ultimate App Store List, (2017)
[5]  
Allix K., Bissyande T. F., Jerome Q., Klein J., Le Traon Y., Et al., Empirical assessment of machine learning-based malware detectors for Android, Empirical Software Engineering, 21, 1, pp. 183-211, (2016)
[6]  
Allix K., Bissyande T.F., Klein J., Le Traon Y., Androzoo: collecting millions of Android apps for the research community, IEEE/ACM 13th Working Conference on Mining Software Repositories (MSR), pp. 468-471, (2016)
[7]  
Amrutkar C., Traynor P., Van Oorschot P. C., An empirical evaluation of security indicators in mobile web browsers, IEEE Transactions on Mobile Computing, 14, 5, pp. 889-903, (2015)
[8]  
Arp D., Spreitzenbarth M., Hubner M., Gascon H., Rieck K., Siemens C., Drebin: effective and explainable detection of android malware in your pocket, NDSS, (2014)
[9]  
Millions of Android Phones Hit by'Judy' malware, (2017)
[10]  
Chen J., Alalfi M.H., Dean T.R., Zou Y., Detecting Android malware using clone detection, Journal of Computer Science and Technology, 30, 5, pp. 942-956, (2015)