Deep Learning for Android Malware Defenses: A Systematic Literature Review

被引:49
作者
Liu, Yue [1 ]
Tantithamthavorn, Chakkrit [1 ]
Li, Li [1 ]
Liu, Yepang [2 ]
机构
[1] Monash Univ, Wellington Rd, Clayton, Vic 3800, Australia
[2] Southern Univ Sci & Technol, 1088 Xueyuan Ave, Shenzhen, Peoples R China
关键词
Android; malware defenses; malware analysis; malware detection; deep learning; reviews; mobile security; NEURAL-NETWORKS; FRAMEWORK; ATTACKS;
D O I
10.1145/3544968
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious applications (particularly those targeting the Android platform) pose a serious threat to developers and end-users. Numerous research efforts have been devoted to developing effective approaches to defend against Android malware. However, given the explosive growth of Android malware and the continuous advancement of malicious evasion technologies like obfuscation and reflection, Android malware defense approaches based on manual rules or traditional machine learning may not be effective. In recent years, a dominant research field called deep learning (DL), which provides a powerful feature abstraction ability, has demonstrated a compelling and promising performance in a variety of areas, like natural language processing and computer vision. To this end, employing DL techniques to thwart Android malware attacks has recently garnered considerable research attention. Yet, no systematic literature review focusing on DL approaches for Android malware defenses exists. In this article, we conducted a systematic literature review to search and analyze how DL approaches have been applied in the context of malware defenses in the Android environment. As a result, a total of 132 studies covering the period 2014-2021 were identified. Our investigation reveals that, while the majority of these sources mainly consider DL-based Android malware detection, 53 primary studies (40.1%) design defense approaches based on other scenarios. This review also discusses research trends, research focuses, challenges, and future research directions in DL-based Android malware defenses.
引用
收藏
页数:36
相关论文
共 198 条
[1]   Android Malware Detection Based on System Calls Analysis and CNN Classification [J].
Abderrahmane, Abada ;
Adnane, Guettaf ;
Yacine, Challal ;
Khireddine, Garri .
2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOP (WCNCW), 2019,
[2]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[3]  
Alqahtani EJ, 2019, 2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), P110, DOI [10.1109/SDS.2019.8768729, 10.1109/sds.2019.8768729]
[4]  
Alshahrani H., 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE), P1, DOI DOI 10.1109/LISAT.2018.8378035
[5]   DL-Droid: Deep learning based android malware detection using real devices [J].
Alzaylaee, Mohammed K. ;
Yerima, Suleiman Y. ;
Sezer, Sakir .
COMPUTERS & SECURITY, 2020, 89
[6]  
Alzaylaee MK, 2017, PROCEEDINGS OF THE 3RD ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2017, P65, DOI 10.1145/3041008.3041010
[7]   Android malware detection through generative adversarial networks [J].
Amin, Muhammad ;
Shah, Babar ;
Sharif, Aizaz ;
Alit, Tamleek ;
Kim, Ki-Il ;
Anwar, Sajid .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (02)
[8]  
Amodei D, 2016, PR MACH LEARN RES, V48
[9]   SysDroid: a dynamic ML-based android malware analyzer using system call traces [J].
Ananya, A. ;
Aswathy, A. ;
Amal, T. R. ;
Swathy, P. G. ;
Vinod, P. ;
Shojafar, Mohammad .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04) :2789-2808
[10]  
AndroZoo, 2020, ANDROZOO