DroidMD: An efficient and scalable Android malware detection approach at source code level

被引:5
作者
Akram J. [1 ]
Mumtaz M. [1 ]
Jabeen G. [1 ]
Luo P. [1 ]
机构
[1] The Key State Laboratory of Information Security, School of Software Engineering, Tsinghua University
关键词
Android apps re-usability; Android evolution; Android software; Code clones; DroidMD; Malware detection; Mobile security;
D O I
10.1504/IJICS.2021.116310
中图分类号
学科分类号
摘要
Security researchers and anti-virus industries have speckled stress on an Android malware, which can actually damage your phones and threatens the Android markets. In this paper, we propose and develop DroidMD, a scalable self-improvement based tool, based on auto optimisation of signature set, which detect malicious apps in the market at source code level. A prototype has been developed tested and implemented to detect malware in applications. We implement and evaluate our approach on almost 30,000 applications including 27,000 benign and 3,670 malware applications. DroidMD detects malware in different applications at partial level and full level. It analyses only the applications code, which increase its reliability. Our evaluation of DroidMD demonstrates that our approach is very efficient in detecting malware at large scale with high accuracy of 95.5%. © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:299 / 321
页数:22
相关论文
共 63 条
[11]  
Chen K., Liu P., Zhang Y., Achieving accuracy and scalability simultaneously in detecting application clones on Android markets, Proceedings of the 36th International Conference on Software Engineering, pp. 175-186, (2014)
[12]  
Cimpanu C., Ghost Push Android Malware Infects 600,000 New Users Per Day, (2015)
[13]  
contagiominidump, (2018)
[14]  
Cordy J.R., Roy C.K., The nicad clone detector, IEEE 19th International Conference on Program Comprehension (ICPC), pp. 219-220, (2011)
[15]  
Crussell J., Gibler C., Chen H., Andarwin: scalable detection of Android application clones based on semantics, IEEE Transactions on Mobile Computing, 14, 10, pp. 2007-2019, (2015)
[16]  
Cutler S., Malshare Project, (2018)
[17]  
Dang Y., Zhang D., Ge S., Huang R., Chu C., Xie T., Transferring code-clone detection and analysis to practice, IEEE/ACM 39th International Conference on Software Engineering: Software Engineering in Practice Track (ICSE-SEIP), pp. 53-62, (2017)
[18]  
Demontis A., Melis M., Biggio B., Maiorca D., Arp D., Rieck K., Corona I., Giacinto G., Roli F., Yes, machine learning can be more secure! a case study on android malware detection, IEEE Transactions on Dependable and Secure Computing, (2017)
[19]  
Dhaya R., Poongodi M., Detecting software vulnerabilities in Android using static analysis, International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), pp. 915-918, (2014)
[20]  
Farhadi M.R., Fung B.C., Fung Y.B., Charland P., Preda S., Debbabi M., Scalable code clone search for malware analysis, Digital Investigation, 15, pp. 46-60, (2015)