Detection of Android Malicious Apps Based on the Sensitive Behaviors

被引:12
|
作者
Quan, Daiyong [1 ]
Zhai, Lidong [1 ]
Yang, Fan [1 ]
Wang, Peng [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
来源
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM) | 2014年
关键词
Android; Sensitive behavior feature vector; Malware detection;
D O I
10.1109/TrustCom.2014.115
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of malicious applications (apps) targeting the Android system has exploded in recent years. The evolution of malware makes it difficult to detect for static analysis tools. Various behavior-based malware detection techniques to mitigate this problem have been proposed. The drawbacks of the existing approaches are: the behavior features extracted from a single source lead to the low detection accuracy and the detection process is too complex. Especially it is unsuitable for smart phones with limited computing power. In this paper, we extract sensitive behavior features from three sources: API calls, native code dynamic execution, and system calls. We propose a sensitive behavior feature vector for representation multi-source behavior features uniformly. Our sensitive behavior representation is able to automatically describe the low-level OS-specific behaviors and high-level application-specific behaviors of an Android malware. Based on the unified behavior feature representation, we provide a light weight decision function to differentiate a given application benign or malicious. We tested the effectiveness of our approach against real malware and the results of our experiments show that its detection accuracy up to 96% with acceptable performance overhead. For a given threshold t (t=9), we can detect the advanced malware family effectively.
引用
收藏
页码:877 / 883
页数:7
相关论文
共 50 条
  • [41] VPNDroid: Malicious Android VPN Detection Using a CNN-RF Method
    Polatidis, Nikolaos
    Pimenidis, Elias
    Trovati, Marcello
    Iliadis, Lazaros
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PART X, 2023, 14263 : 444 - 453
  • [42] MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs
    Tao, Guanhong
    Zheng, Zibin
    Guo, Ziying
    Lyu, Michael R.
    IEEE TRANSACTIONS ON RELIABILITY, 2018, 67 (01) : 355 - 369
  • [43] FraudDroid: Automated Ad Fraud Detection for Android Apps
    Dong, Feng
    Wang, Haoyu
    Li, Li
    Guo, Yao
    Bissyande, Tegawende F.
    Liu, Tianming
    Xu, Guoai
    Klein, Jacques
    ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2018, : 257 - 268
  • [44] Comparative analysis of malicious Android-based software detection with trending metaheuristic algorithms
    Bestas, Mehmet Sirin
    Batur Dinle, Ozlem
    PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2025, 31 (01): : 98 - 115
  • [45] Detecting Applications with Malicious Behavior in Android Device Based on GA and SVM
    Liu, Ning
    Yang, Min
    Zhang, Shibin
    PROCEEDINGS OF THE 2017 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2017), 2017, 140 : 257 - 261
  • [46] A static Android malicious code detection method based on multi-source fusion
    Du, Yao
    Wang, Xiaoqing
    Wang, Junfeng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3238 - 3246
  • [47] GNNDroid: Graph-Learning Based Malware Detection for Android Apps With Native Code
    Xi, Ning
    Zhang, Yuchen
    Feng, Pengbin
    Ma, Siqi
    Ma, Jianfeng
    Shen, Yulong
    Yang, Yale
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1460 - 1476
  • [48] Quick and Accurate Android Malware Detection Based on Sensitive APIs
    Zhao, Chunlei
    Zheng, Wenbai
    Gong, Liangyi
    Zhang, Mengzhe
    Wang, Chundong
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART INTERNET OF THINGS (SMARTIOT 2018), 2018, : 143 - 148
  • [49] DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis
    Fan, Ming
    Liu, Jun
    Wang, Wei
    Li, Haifei
    Tian, Zhenzhou
    Liu, Ting
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) : 1772 - 1785
  • [50] NCD Based DEX Similarity Inspection for Detection of Fake Mobile Apps on Android Platform
    Cho, Seok Young
    Lee, Hyung-Woo
    ADVANCED SCIENCE LETTERS, 2017, 23 (10) : 10197 - 10203