Detection of Repackaged Android Malware with Code-Heterogeneity Features

被引:46
作者
Tian, Ke [1 ]
Yao, Danfeng [1 ]
Ryder, Barbara G. [1 ]
Tan, Gang [2 ]
Peng, Guojun [3 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24060 USA
[2] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[3] Wuhan Univ, Sch Comp, Wuhan 430072, Peoples R China
基金
美国国家科学基金会;
关键词
Android security; malware detection; repackaged malware;
D O I
10.1109/TDSC.2017.2745575
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
During repackaging, malware writers statically inject malcode and modify the control flow to ensure its execution. Repackaged malware is difficult to detect by existing classification techniques, partly because of their behavioral similarities to benign apps. By exploring the app's internal different behaviors, we propose a new Android repackaged malware detection technique based on code heterogeneity analysis. Our solution strategically partitions the code structure of an app into multiple dependence-based regions (subsets of the code). Each region is independently classified on its behavioral features. We point out the security challenges and design choices for partitioning code structures at the class and method level graphs, and present a solution based on multiple dependence relations. We have performed experimental evaluation with over 7,542 Android apps. For repackaged malware, our partition-based detection reduces false negatives (i.e., missed detection) by 30-fold, when compared to the non-partition-based approach. Overall, our approach achieves a false negative rate of 0.35 percent and a false positive rate of 2.97 percent.
引用
收藏
页码:64 / 77
页数:14
相关论文
共 45 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
[Anonymous], 2014, Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
[3]  
[Anonymous], 2015, NDSS
[4]  
[Anonymous], [No title captured]
[5]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[6]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[7]  
Au K. W. Y., 2012, P 2012 ACM C COMP CO, DOI [10.1145/2382196.2382222, DOI 10.1145/2382196.2382222]
[8]   Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications [J].
Bosu, Amiangshu ;
Liu, Fang ;
Yao, Danfeng ;
Wang, Gang .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :71-85
[9]  
Burguera I., 2011, P 1 ACM WORKSH SEC P, P15, DOI DOI 10.1145/2046614.2046619
[10]   The comparative study between China and South Korea on online shopping [J].
Cao Shuyang ;
Sun Meng ;
Li Haotong .
2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, :16-19