Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection

被引:23
作者
Salem, Aleieldin [1 ]
Banescu, Sebastian [1 ]
Pretschner, Alexander [1 ]
机构
[1] Tech Univ Munich, Boltzmannstr 3, D-85748 Garching, Germany
关键词
Android security; malware detection; machine learning;
D O I
10.1145/3465361
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The malware analysis and detection research community relies on the online platform VirusTotal to label Android apps based on the scan results of around 60 antiviral scanners. Unfortunately, there are no standards on how to best interpret the scan results acquired from VirusTotal, which leads to the utilization of different threshold-based labeling strategies (e.g., if 10 or more scanners deem an app malicious, it is considered malicious). While some of the utilized thresholds may be able to accurately approximate the ground truths of apps, the fact that VirusTotal changes the set and versions of the scanners it uses makes such thresholds unsustainable over time. We implemented a method, Maat, that tackles these issues of standardization and sustainability by automatically generating a Machine Learning (ML)-based labeling scheme, which outperforms threshold-based labeling strategies. Using the VirusTotal scan reports of 53K Android apps that span 1 year, we evaluated the applicability of Maat's Machine Learning (ML)-based labeling strategies by comparing their performance against threshold-based strategies. We found that such ML-based strategies (a) can accurately and consistently label apps based on their VirusTotal scan reports, and (b) contribute to training ML-based detection methods that are more effective at classifying out-of-sample apps than their threshold-based counterparts.
引用
收藏
页数:35
相关论文
共 44 条
[11]  
International Diabetes Federation, 2019, IDF DIABETES ATLAS
[12]  
Kantchelian Alex, 2015, P 8 ACM WORKSHOP ART, P45, DOI DOI 10.1145/2808769.2808780
[13]   The (in)consistent naming of malcode [J].
Kelchner T. .
Computer Fraud and Security, 2010, 2010 (02) :5-7
[14]   Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting [J].
Li, Li ;
Li, Daoyuan ;
Bissyande, Tegawende F. ;
Klein, Jacques ;
Le Traon, Yves ;
Lo, David ;
Cavallaro, Lorenzo .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) :1269-1284
[15]  
Luo Symphony, 2014, FAKE APPS FEIGNING L
[16]  
Maggi F, 2011, LECT NOTES COMPUT SC, V7093, P144, DOI 10.1007/978-3-642-25560-1_10
[17]  
Miller B, 2016, LECT NOTES COMPUT SC, V9721, P122, DOI 10.1007/978-3-319-40667-1_7
[18]  
Mohaisen A, 2014, LECT NOTES COMPUT SC, V8550, P112
[19]  
Mohaisen Aziz, 2013, INT WORKSH INF SEC A, P231
[20]  
Oberheide Jon, 2012, DISSECTING ANDROID B