Detection of Android Malicious Apps Based on the Sensitive Behaviors

被引:12
|
作者
Quan, Daiyong [1 ]
Zhai, Lidong [1 ]
Yang, Fan [1 ]
Wang, Peng [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
来源
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) | 2014年
关键词
Android; Sensitive behavior feature vector; Malware detection;
D O I
10.1109/TrustCom.2014.115
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of malicious applications (apps) targeting the Android system has exploded in recent years. The evolution of malware makes it difficult to detect for static analysis tools. Various behavior-based malware detection techniques to mitigate this problem have been proposed. The drawbacks of the existing approaches are: the behavior features extracted from a single source lead to the low detection accuracy and the detection process is too complex. Especially it is unsuitable for smart phones with limited computing power. In this paper, we extract sensitive behavior features from three sources: API calls, native code dynamic execution, and system calls. We propose a sensitive behavior feature vector for representation multi-source behavior features uniformly. Our sensitive behavior representation is able to automatically describe the low-level OS-specific behaviors and high-level application-specific behaviors of an Android malware. Based on the unified behavior feature representation, we provide a light weight decision function to differentiate a given application benign or malicious. We tested the effectiveness of our approach against real malware and the results of our experiments show that its detection accuracy up to 96% with acceptable performance overhead. For a given threshold t (t=9), we can detect the advanced malware family effectively.
引用
收藏
页码:877 / 883
页数:7
相关论文
共 50 条
  • [21] AndroAnalyzer: android malicious software detection based on deep learning
    Arslan, Recep Sinan
    PEERJ COMPUTER SCIENCE, 2021,
  • [22] On the use of artificial malicious patterns for android malware detection
    Jerbi, Manel
    Dagdia, Zaineb Chelly
    Bechikh, Slim
    Ben Said, Lamjed
    COMPUTERS & SECURITY, 2020, 92 (92)
  • [23] Machine Learning-Based Malicious Application Detection of Android
    Wei, Linfeng
    Luo, Weiqi
    Weng, Jian
    Zhong, Yanjun
    zhang, Xiaoqian
    Yan, Zheng
    IEEE ACCESS, 2017, 5 : 25591 - 25601
  • [24] A detection model of malicious Android applications based on Naive Bayes
    Wang, Chundong
    Zhao, Yi
    Mo, Xiuliang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 508 - 515
  • [25] Androanalyzer: Android Malicious Software Detection Based on Deep Learning
    Arslan R.S.
    PeerJ Computer Science, 2021, 7 : 1 - 20
  • [26] A machine learning based approach to detect malicious android apps using discriminant system calls
    Vinod, P.
    Zemmari, Akka
    Conti, Mauro
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 94 : 333 - 350
  • [27] Combining Multimodal DNN and SigPid technique for detecting Malicious Android Apps
    Vasu, Balaji
    Pari, Neelavathy
    2019 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC 2019), 2019, : 289 - 294
  • [28] Proactive Libraries: Enforcing Correct Behaviors in Android Apps
    Riganelli, Oliviero
    Fagadau, Ionut Daniel
    Micucci, Daniela
    Mariani, Leonardo
    2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2022), 2022, : 159 - 163
  • [29] MadDroid: malicious adware detection in Android using deep learning
    Seraj, Saeed
    Pavlidis, Michalis
    Trovati, Marcello
    Polatidis, Nikolaos
    Journal of Cyber Security Technology, 2024, 8 (03) : 163 - 190
  • [30] Detecting Android application malicious behaviors based on the analysis of control flows and data flows
    Zegzhda, Peter
    Zegzhda, Dmitry
    Pavlenko, Evgeny
    Dremov, Andrew
    SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 280 - 283