SAC: Collaborative learning of structure and content features for Android malware detection framework

被引:0
作者
Yang, Jin [1 ,2 ,3 ]
Liang, Huijia [1 ]
Ren, Hang [2 ]
Jia, Dongqing [1 ]
Wang, Xin [1 ]
机构
[1] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610207, Sichuan, Peoples R China
[2] Minist Educ, Key Lab Data Protect & Intelligent Management, Chengdu 610207, Peoples R China
[3] Tibet Univ, Sch Informat Sci & Technol, Lhasa 850000, Xizang, Peoples R China
基金
中国国家自然科学基金;
关键词
Android; Malware detection; Graph convolutional network; Convolutional neural network; Deep learning;
D O I
10.1016/j.neucom.2025.130053
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of Internet of Things (IoT) technology, Android devices have increasingly become primary targets for malware attacks. Although significant research has been conducted in the field of malware detection, existing methods still face challenges when dealing with complex samples. In particular, a more comprehensive analysis is required in the domain of feature extraction. To enhance the accuracy of malware detection, we propose the SAC framework. This method utilizes Dalvik Executable (DEX) files as the data source and achieves deep integration of multi-view features by collaboratively modeling image and graph data types. Specifically, to accurately capture the local features of malware and improve the identification of critical behavioral patterns, we designed a task-oriented convolutional neural network (CNN) named IFNeXt, which integrates visualization analysis with an inverted bottleneck structure. Furthermore, we introduced a dual-channel graph convolutional network (GCN) that models the hierarchical structure of bytecode as a directed graph, capturing the co-occurrence relationships and semantic similarities between method calls. This approach enables a deeper exploration of the global structural features of malware. The SAC framework fully leverages the complementary advantages of image and graph data structures, providing a more comprehensive characterization of malware features from both content and structural perspectives. Experimental results demonstrate that our method achieves a detection accuracy of 99.43% on multiple real-world public datasets, significantly outperforming existing state-of-the-art detection techniques. This indicates the potential and innovation of our approach in enhancing the security of the Android platform.
引用
收藏
页数:13
相关论文
共 66 条
  • [11] MalNet: A Large-Scale Image Database of Malicious Software
    Freitas, Scott
    Duggal, Rahul
    Chau, Duen Horng
    [J]. PROCEEDINGS OF THE 31ST ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2022, 2022, : 3948 - 3952
  • [12] Android malware detection via an app similarity graph
    Frenklach, Tatiana
    Cohen, Dvir
    Shabtai, Asaf
    Puzis, Rami
    [J]. COMPUTERS & SECURITY, 2021, 109
  • [13] Gao C., 2024, P IEEE ACM 46 INT C, P1, DOI [10.1145/3597503.3623320, DOI 10.1145/3597503.3623320]
  • [14] Obfuscation-Resilient Android Malware Analysis Based on Complementary Features
    Gao, Cuiying
    Cai, Minghui
    Yin, Shuijun
    Huang, Gaozhun
    Li, Heng
    Yuan, Wei
    Luo, Xiapu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5056 - 5068
  • [15] Hamilton WL, 2017, ADV NEUR IN, V30
  • [16] ConvUNeXt: An efficient convolution neural network for medical image segmentation
    Han, Zhimeng
    Jian, Muwei
    Wang, Gai-Ge
    [J]. KNOWLEDGE-BASED SYSTEMS, 2022, 253
  • [17] Deep Residual Learning for Image Recognition
    He, Kaiming
    Zhang, Xiangyu
    Ren, Shaoqing
    Sun, Jian
    [J]. 2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, : 770 - 778
  • [18] Hsien-De Huang T, 2018, IEEE INT CONF BIG DA, P2633, DOI 10.1109/BigData.2018.8622324
  • [19] Recurrent neural network for detecting malware
    Jha, Sudan
    Prashar, Deepak
    Hoang Viet Long
    Taniar, David
    [J]. COMPUTERS & SECURITY, 2020, 99
  • [20] Long short-term memory-based Malware classification method for information security
    Kang, Jungho
    Jang, Sejun
    Li, Shuyu
    Jeong, Young-Sik
    Sung, Yunsick
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2019, 77 : 366 - 375