Cyber Code Intelligence for Android Malware Detection

被引:27
作者
Qiu, Junyang [1 ]
Han, Qing-Long [2 ]
Luo, Wei [1 ]
Pan, Lei [1 ]
Nepal, Surya [3 ]
Zhang, Jun [2 ]
Xiang, Yang [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3216, Australia
[2] Swinburne Univ Technol, Sch Sci Comp & Engn Technol, Melbourne, Vic 3122, Australia
[3] CSIRO, Data61, Sydney, NSW 1710, Australia
关键词
Malware; Feature extraction; Smart phones; Labeling; Deep learning; Cybernetics; Australia; Android malware; deep neural network; multiview features; security; privacy-related capability; static analysis; CYBERSECURITY; NETWORKS;
D O I
10.1109/TCYB.2022.3164625
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Evolving Android malware poses a severe security threat to mobile users, and machine-learning (ML)-based defense techniques attract active research. Due to the lack of knowledge, many zero-day families' malware may remain undetected until the classifier gains specialized knowledge. The most existing ML-based methods will take a long time to learn new malware families in the latest malware family landscape. Existing ML-based Android malware detection and classification methods struggle with the fast evolution of the malware landscape, particularly in terms of the emergence of zero-day malware families and limited representation of single-view features. In this article, a new multiview feature intelligence (MFI) framework is developed to learn the representation of a targeted capability from known malware families for recognizing unknown and evolving malware with the same capability. The new framework performs reverse engineering to extract multiview heterogeneous features, including semantic string features, API call graph features, and smali opcode sequential features. It can learn the representation of a targeted capability from known malware families through a series of processes of feature analysis, selection, aggregation, and encoding, to detect unknown Android malware with shared target capability. We create a new dataset with ground-truth information regarding capability. Many experiments are conducted on the new dataset to evaluate the performance and effectiveness of the new method. The results demonstrate that the new method outperforms three state-of-the-art methods, including: 1) Drebin; 2) MaMaDroid; and 3) N-opcode, when detecting unknown Android malware with targeted capabilities.
引用
收藏
页码:617 / 627
页数:11
相关论文
共 44 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[3]   Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection [J].
Chen, Xiao ;
Li, Chaoran ;
Wang, Derui ;
Wen, Sheng ;
Zhang, Jun ;
Nepal, Surya ;
Xiang, Yang ;
Ren, Kui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :987-1001
[4]  
Deshotels L., 2014, Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014, P3, DOI [10.1145/2556464.2556467, DOI 10.1145/2556464.2556467]
[5]   Graph Embedding based Familial Analysis of Android Malware using Unsupervised Learning [J].
Fan, Ming ;
Luo, Xiapu ;
Liu, Jun ;
Wang, Meng ;
Nong, Chunyin ;
Zheng, Qinghua ;
Liu, Ting .
2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2019), 2019, :771-782
[6]   Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability [J].
Feng, Yu ;
Bastani, Osbert ;
Martins, Ruben ;
Dillig, Isil ;
Anand, Saswat .
24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
[7]   Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis [J].
Feng, Yu ;
Anand, Saswat ;
Dillig, Isil ;
Aiken, Alex .
22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, :576-587
[8]   Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware [J].
Garcia, Joshua ;
Hammad, Mahmoud ;
Malek, Sam .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2018, 26 (03)
[9]   HinDroid: An Intelligent Android Malware Detection System Based on Structured Heterogeneous Information Network [J].
Hou, Shifu ;
Ye, Yanfang ;
Song, Yangqiu ;
Abdulhayoglu, Melih .
KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, :1507-1515
[10]  
Jordaney R, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P625