Manilyzer: Automated Android Malware Detection through Manifest Analysis

被引:19
作者
Feldman, Stephen [1 ]
Stadther, Dillon [2 ]
Wang, Bing [3 ]
机构
[1] Univ Virginia, 1980 Arlington Blvd Apt 1, Charlottesville, VA 22903 USA
[2] Gardner Webb Univ, Boiling Springs, NC 28017 USA
[3] Univ Connecticut, Storrs, CT 06269 USA
来源
2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS) | 2014年
关键词
Android security; data mining; malware detection; Manilyzer;
D O I
10.1109/MASS.2014.65
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the world's most popular mobile operating system, Google's Android OS is the principal target of an ever increasing mobile malware threat. To counter this emerging menace, many malware detection techniques have been proposed. A key aspect of many static detection techniques is their reliance on the permissions requested in the AndroidManifest.xml file. Although these permissions are very important, the manifest also contains additional information that can be valuable in identifying malware, which, however, has not been fully utilized by existing studies. In this paper we present Manilyzer, a system that exploits the rich information in the manifest files, produces feature vectors automatically, and uses state-of-the-art machine learning algorithms to classify applications as malicious or benign. We apply Manilyzer to 617 applications (307 malicious, 310 benign) and find that it is very effective: the accuracy is up to 90%, while the false positives and false negatives are both around 10%. In addition to classifying applications, Manilyzer is used to study the trends of permission requests in malicious applications. Through this evaluation and further analysis, it is clear that malware has evolved over time, and not all malware can be detected through static analysis of manifest files. To address this issue, we briefly explore a dynamic analysis technique that monitors network traffic using a packet sniffer.
引用
收藏
页码:767 / 772
页数:6
相关论文
共 12 条
  • [1] [Anonymous], 2012, P 10 INT C MOB SYST
  • [2] [Anonymous], NETW DISTR SYST SEC
  • [3] [Anonymous], 2014, GARTNER SAYS ANN SMA
  • [4] [Anonymous], 2014, MOBILE MALWARE EVOLU
  • [5] Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
  • [6] Felt A.P., 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618
  • [7] Hall M., 2009, SIGKDD Explorations, V11, P10, DOI DOI 10.1145/1656274.1656278
  • [8] Machine Learning for Android Malware Detection Using Permission and API Calls
    Peiravian, Naser
    Zhu, Xingquan
    [J]. 2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2013, : 300 - 305
  • [9] Smartphone Dual Defense Protection Framework: Detecting malicious applications in Android Markets
    Su, X.
    Chuah, M.
    Tan, G.
    [J]. 2012 EIGHTH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR NETWORKS (MSN 2012), 2012, : 153 - 160
  • [10] DroidMat: Android Malware Detection through Manifest and API Calls Tracing
    Wu, Dong-Jie
    Mao, Ching-Hao
    Wei, Te-En
    Lee, Hahn-Ming
    Wu, Kuo-Ping
    [J]. PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 62 - 69