AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection

被引:154
作者
Feizollah, Ali [1 ]
Anuar, Nor Badrul [1 ]
Salleh, Rosli [1 ]
Suarez-Tangil, Guillermo [2 ,4 ]
Furnell, Steven [3 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Kuala Lumpur 50603, Malaysia
[2] Univ Carlos III Madrid, Dept Comp Sci, Comp Secur COSEC Lab, Madrid 28911, Spain
[3] Univ Plymouth, Ctr Secur Commun & Network Res, Sch Comp Elect & Math, Drake Circus, Plymouth PL4 8AA, Devon, England
[4] Royal Holloway Univ London, Egham TW20 0EX, Surrey, England
关键词
Mobile malware; Android; Intent; Smartphone security; Static analysis;
D O I
10.1016/j.cose.2016.11.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-party applications running on top of any Android device. Inter-process communication is one of the most notable features of the Android framework as it allows the reuse of components across process boundaries. This mechanism is used as gateway to access different sensitive services in the Android framework. In the Android platform, this communication system is usually driven by a late runtime binding messaging object known as Intent. In this paper, we evaluate the effectiveness of Android Intents (explicit and implicit) as a distinguishing feature for identifying malicious applications. We show that Intents are semantically rich features that are able to encode the intentions of malware when compared to other well-studied features such as permissions. We also argue that this type of feature is not the ultimate solution. It should be used in conjunction with other known features. We conducted experiments using a dataset containing 7406 applications that comprise 1846 clean and 5560 infected applications. The results show detection rate of 91% using Android Intent against 83% using Android permission. Additionally, experiment on combination of both features results in detection rate of 95.5%. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:121 / 134
页数:14
相关论文
共 58 条
  • [31] Jiang X., 2013, Android Malware
  • [32] Jo NY, 2011, COMM COM INF SC, V151, P428
  • [33] Jung W, 2012, CODES+ISSS'12:PROCEEDINGS OF THE TENTH ACM INTERNATIONAL CONFERENCE ON HARDWARE/SOFTWARE-CODESIGN AND SYSTEM SYNTHESIS, P353
  • [34] Structure learning of Bayesian networks by genetic algorithms: A performance analysis of control parameters
    Larranaga, P
    Poza, M
    Yurramendi, Y
    Murga, RH
    Kuijpers, CMH
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1996, 18 (09) : 912 - 926
  • [35] IccTA: Detecting Inter-Component Privacy Leaks in Android Apps
    Li, Li
    Bartel, Alexandre
    Bissyande, Tegawende F.
    Klein, Jacques
    Le Traon, Yves
    Arzt, Steven
    Rasthofer, Siegfried
    Bodden, Eric
    Octeau, Damien
    McDaniel, Patrick
    [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 280 - 291
  • [36] Mining permission patterns for contrasting clean and malicious android applications
    Moonsamy, Veelasha
    Rong, Jia
    Liu, Shaowu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 : 122 - 132
  • [37] Evaluation of machine learning classifiers for mobile malware detection
    Narudin, Fairuz Amalina
    Feizollah, Ali
    Anuar, Nor Badrul
    Gani, Abdullah
    [J]. SOFT COMPUTING, 2016, 20 (01) : 343 - 357
  • [38] Oberheide J, 2012, P SUMMERCON NEW YORK
  • [39] Composite Constant Propagation: Application to Android Inter-Component Communication Analysis
    Octeau, Damien
    Luchaup, Daniel
    Dering, Matthew
    Jha, Somesh
    McDaniel, Patrick
    [J]. 2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, 2015, : 77 - 88
  • [40] Pandita R., 2013, Proceedings of USENIX Security, P527