Detection of Android Malicious Apps Based on the Sensitive Behaviors

被引:12
|
作者
Quan, Daiyong [1 ]
Zhai, Lidong [1 ]
Yang, Fan [1 ]
Wang, Peng [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
来源
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) | 2014年
关键词
Android; Sensitive behavior feature vector; Malware detection;
D O I
10.1109/TrustCom.2014.115
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of malicious applications (apps) targeting the Android system has exploded in recent years. The evolution of malware makes it difficult to detect for static analysis tools. Various behavior-based malware detection techniques to mitigate this problem have been proposed. The drawbacks of the existing approaches are: the behavior features extracted from a single source lead to the low detection accuracy and the detection process is too complex. Especially it is unsuitable for smart phones with limited computing power. In this paper, we extract sensitive behavior features from three sources: API calls, native code dynamic execution, and system calls. We propose a sensitive behavior feature vector for representation multi-source behavior features uniformly. Our sensitive behavior representation is able to automatically describe the low-level OS-specific behaviors and high-level application-specific behaviors of an Android malware. Based on the unified behavior feature representation, we provide a light weight decision function to differentiate a given application benign or malicious. We tested the effectiveness of our approach against real malware and the results of our experiments show that its detection accuracy up to 96% with acceptable performance overhead. For a given threshold t (t=9), we can detect the advanced malware family effectively.
引用
收藏
页码:877 / 883
页数:7
相关论文
共 50 条
  • [31] Unraveling Reflection Induced Sensitive Leaks in Android Apps
    Gajrani, Jyoti
    Laxmi, Vijay
    Tripathi, Meenakshi
    Gaur, Manoj S.
    Sharma, Daya Ram
    Zemmari, Akka
    Mosbah, Mohamed
    Conti, Mauro
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2017, 2018, 10694 : 49 - 65
  • [32] DroidKin: Lightweight Detection of Android Apps Similarity
    Gonzalez, Hugo
    Stakhanova, Natalia
    Ghorbani, Ali A.
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 436 - 453
  • [33] A Dynamic and Static Combined Android Malicious Code Detection Model based on SVM
    Du, Jinran
    Chen, Huajun
    Zhong, Weijie
    Liu, Zhen
    Xu, Aidong
    2018 5TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2018, : 801 - 806
  • [34] Learning-Based Detection for Malicious Android Application Using Code Vectorization
    Liu, Lin
    Ren, Wang
    Xie, Feng
    Yi, Shengwei
    Yi, Junkai
    Jia, Peng
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [35] Detection malicious Android application based on simple-Dalvik intermediate language
    Li, Qi
    Sun, Bowen
    Chen, Meiqi
    Dong, Hang
    NEURAL COMPUTING & APPLICATIONS, 2019, 31 (Suppl 1) : 185 - 194
  • [36] Detection malicious Android application based on simple-Dalvik intermediate language
    Qi Li
    Bowen Sun
    Meiqi Chen
    Hang Dong
    Neural Computing and Applications, 2019, 31 : 185 - 194
  • [37] A machine learning technique for Android malicious attacks detection based on API calls
    AL-Akhrasa, Mousa
    Alghamdib, Saud
    Omarc, Hani
    Alshareefb, Hazzaa
    DECISION SCIENCE LETTERS, 2024, 13 (01) : 29 - 44
  • [38] Malicious application detection in android - A systematic literature review
    Sharma, Tejpal
    Rattan, Dhavleesh
    COMPUTER SCIENCE REVIEW, 2021, 40
  • [39] Malicious Application Detection and Classification System for Android Mobiles
    Malik, Sapna
    Khatter, Kiran
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2018, 9 (01) : 95 - 114
  • [40] Malicious code detection for Android using Instruction Signatures
    Hu Ge
    Li Ting
    Dong Hang
    Yu Hewei
    Zhang Miao
    2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 332 - 337