DroidMD: An efficient and scalable Android malware detection approach at source code level

被引:5
作者
Akram J. [1 ]
Mumtaz M. [1 ]
Jabeen G. [1 ]
Luo P. [1 ]
机构
[1] The Key State Laboratory of Information Security, School of Software Engineering, Tsinghua University
关键词
Android apps re-usability; Android evolution; Android software; Code clones; DroidMD; Malware detection; Mobile security;
D O I
10.1504/IJICS.2021.116310
中图分类号
学科分类号
摘要
Security researchers and anti-virus industries have speckled stress on an Android malware, which can actually damage your phones and threatens the Android markets. In this paper, we propose and develop DroidMD, a scalable self-improvement based tool, based on auto optimisation of signature set, which detect malicious apps in the market at source code level. A prototype has been developed tested and implemented to detect malware in applications. We implement and evaluate our approach on almost 30,000 applications including 27,000 benign and 3,670 malware applications. DroidMD detects malware in different applications at partial level and full level. It analyses only the applications code, which increase its reliability. Our evaluation of DroidMD demonstrates that our approach is very efficient in detecting malware at large scale with high accuracy of 95.5%. © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:299 / 321
页数:22
相关论文
共 63 条
[51]  
Su X., Zhang D., Li W., Zhao K., A deep learning approach to Android malware feature learning and detection, Trustcom/BigDataSE/I⣠SPA, pp. 244-251, (2016)
[52]  
Svajlenko J., Roy C.K., Cloneworks: a fast and flexible large-scale near-miss clone detection tool, Proceedings of the 39th International Conference on Software Engineering Companion, pp. 177-179, (2017)
[53]  
Svajlenko J., Roy C.K., Fast and flexible large-scale clone detection with cloneworks, Proceedings of the 39th International Conference on Software Engineering Companion, pp. 27-30, (2017)
[54]  
Fake Whatsapp on Google Play Store Downloaded by Over 1 Million Android Users, (2017)
[55]  
Tech Z.H.T.X., App China, (2018)
[56]  
Viennot N., Java Library for Jd-Core, A Java Decompiler, (2017)
[57]  
Wang Z., Li C., Guan Y., Xue Y., Droidchain: a novel malware detection method for Android based on behavior chain, IEEE Conference on Communications and Network Security (CNS), pp. 727-728, (2015)
[58]  
Wu D-J., Mao C-H., Wei T-E., Lee H-M., Wu K-P., Droidmat: Android malware detection through manifest and api calls tracing, Seventh Asia Joint Conference on Information Security (Asia JCIS), pp. 62-69, (2012)
[59]  
Yajin Zhou X.J., Android Malware Genome Project, (2017)
[60]  
Yerima S.Y., Sezer S., McWilliams G., Muttik I., A new Android malware detection approach using bayesian classification, IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 121-128, (2013)