SAC: Collaborative learning of structure and content features for Android malware detection framework

被引:0
作者
Yang, Jin [1 ,2 ,3 ]
Liang, Huijia [1 ]
Ren, Hang [2 ]
Jia, Dongqing [1 ]
Wang, Xin [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Sichuan, Peoples R China
[2] Minist Educ, Key Lab Data Protect & Intelligent Management, Chengdu 610207, Peoples R China
[3] Tibet Univ, Sch Informat Sci & Technol, Lhasa 850000, Xizang, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; Malware detection; Graph convolutional network; Convolutional neural network; Deep learning;
D O I
10.1016/j.neucom.2025.130053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of Internet of Things (IoT) technology, Android devices have increasingly become primary targets for malware attacks. Although significant research has been conducted in the field of malware detection, existing methods still face challenges when dealing with complex samples. In particular, a more comprehensive analysis is required in the domain of feature extraction. To enhance the accuracy of malware detection, we propose the SAC framework. This method utilizes Dalvik Executable (DEX) files as the data source and achieves deep integration of multi-view features by collaboratively modeling image and graph data types. Specifically, to accurately capture the local features of malware and improve the identification of critical behavioral patterns, we designed a task-oriented convolutional neural network (CNN) named IFNeXt, which integrates visualization analysis with an inverted bottleneck structure. Furthermore, we introduced a dual-channel graph convolutional network (GCN) that models the hierarchical structure of bytecode as a directed graph, capturing the co-occurrence relationships and semantic similarities between method calls. This approach enables a deeper exploration of the global structural features of malware. The SAC framework fully leverages the complementary advantages of image and graph data structures, providing a more comprehensive characterization of malware features from both content and structural perspectives. Experimental results demonstrate that our method achieves a detection accuracy of 99.43% on multiple real-world public datasets, significantly outperforming existing state-of-the-art detection techniques. This indicates the potential and innovation of our approach in enhancing the security of the Android platform.
引用
收藏
页数:13
相关论文
共 66 条
  • [1] Static malware detection and attribution in android byte-code through an end-to-end deep system
    Amin, Muhammad
    Tanveer, Tamleek Ali
    Tehseen, Mohammad
    Khan, Murad
    Khan, Fakhri Alam
    Anwar, Sajid
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 : 112 - 126
  • [2] Android malware detection through generative adversarial networks
    Amin, Muhammad
    Shah, Babar
    Sharif, Aizaz
    Alit, Tamleek
    Kim, Ki-Il
    Anwar, Sajid
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (02)
  • [3] Drebin: Effective and Explainable Detection of Android Malware in Your Pocket
    Arp, Daniel
    Spreitzenbarth, Michael
    Huebner, Malte
    Gascon, Hugo
    Rieck, Konrad
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [4] FAMD: A Fast Multifeature Android Malware Detection Framework, Design, and Implementation
    Bai, Hongpeng
    Xie, Nannan
    Di, Xiaoqiang
    Ye, Qing
    [J]. IEEE ACCESS, 2020, 8 (08): : 194729 - 194740
  • [5] Brody S, 2022, Arxiv, DOI [arXiv:2105.14491, DOI 10.48550/ARXIV.2105.14491]
  • [6] Learning features from enhanced function call graphs for Android malware detection
    Cai, Minghui
    Jiang, Yuan
    Gao, Cuiying
    Li, Heng
    Yuan, Wei
    [J]. NEUROCOMPUTING, 2021, 423 : 301 - 307
  • [7] TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification
    Chen, Tieming
    Mao, Qingyu
    Yang, Yimin
    Lv, Mingqi
    Zhu, Jianming
    [J]. MOBILE INFORMATION SYSTEMS, 2018, 2018
  • [8] DEXRAY: A Simple, yet Effective Deep Learning Approach to Android Malware Detection Based on Image Representation of Bytecode
    Daoudi, Nadia
    Samhi, Jordan
    Kabore, Abdoul Kader
    Allix, Kevin
    Bissyande, Tegawende F.
    Klein, Jacques
    [J]. DEPLOYABLE MACHINE LEARNING FOR SECURITY DEFENSE, MLHAT 2021, 2021, 1482 : 81 - 106
  • [9] A malware detection method based on family behavior graph
    Ding, Yuxin
    Xia, Xiaoling
    Chen, Sheng
    Li, Ye
    [J]. COMPUTERS & SECURITY, 2018, 73 : 73 - 86
  • [10] Dosovitskiy A, 2021, Arxiv, DOI arXiv:2010.11929