AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection

被引:154
作者
Feizollah, Ali [1 ]
Anuar, Nor Badrul [1 ]
Salleh, Rosli [1 ]
Suarez-Tangil, Guillermo [2 ,4 ]
Furnell, Steven [3 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Carlos III Madrid, Dept Comp Sci, Comp Secur COSEC Lab, Madrid 28911, Spain
[3] Univ Plymouth, Ctr Secur Commun & Network Res, Sch Comp Elect & Math, Drake Circus, Plymouth PL4 8AA, Devon, England
[4] Royal Holloway Univ London, Egham TW20 0EX, Surrey, England
关键词
Mobile malware; Android; Intent; Smartphone security; Static analysis;
D O I
10.1016/j.cose.2016.11.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-party applications running on top of any Android device. Inter-process communication is one of the most notable features of the Android framework as it allows the reuse of components across process boundaries. This mechanism is used as gateway to access different sensitive services in the Android framework. In the Android platform, this communication system is usually driven by a late runtime binding messaging object known as Intent. In this paper, we evaluate the effectiveness of Android Intents (explicit and implicit) as a distinguishing feature for identifying malicious applications. We show that Intents are semantically rich features that are able to encode the intentions of malware when compared to other well-studied features such as permissions. We also argue that this type of feature is not the ultimate solution. It should be used in conjunction with other known features. We conducted experiments using a dataset containing 7406 applications that comprise 1846 clean and 5560 infected applications. The results show detection rate of 91% using Android Intent against 83% using Android permission. Additionally, experiment on combination of both features results in detection rate of 95.5%. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:121 / 134
页数:14
相关论文
共 58 条
  • [1] Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
  • [2] Analysis of Clustering Technique in Android Malware Detection
    Abu Samra, Aiman A.
    Yim, Kangbin
    Ghanem, Osama A.
    [J]. 2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 729 - 733
  • [3] Aftab M.U. B., 2014, Learning Android Intents
  • [4] [Anonymous], 2012, P 10 INT C MOB SYST
  • [5] [Anonymous], 2015, NDSS
  • [6] [Anonymous], 2012, P USENIX ANN TECH C
  • [7] [Anonymous], P 19 EUR S RES COMP
  • [8] [Anonymous], 2013, ACM C COMP COMM SEC
  • [9] Aresu M, 2015, P 10 INT C MAL UNW S
  • [10] Arp D., 2014, P 2014 NETW DISTR SY