Profiling user-trigger dependence for Android malware detection

被引:74
作者
Elish, Karim O. [1 ]
Shu, Xiaokui [1 ]
Yao, Danfeng [1 ]
Ryder, Barbara G. [1 ]
Jiang, Xuxian [2 ]
机构
[1] Dept Comp Sci, Virginia Tech, Blacksburg, VA 24060 USA
[2] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27606 USA
关键词
Malware detection; User-intention; Static program analysis; Android malware; User-trigger dependence;
D O I
10.1016/j.cose.2014.11.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As mobile computing becomes an integral part of the modern user experience, malicious applications have infiltrated open marketplaces for mobile platforms. Malware apps stealthily launch operations to retrieve sensitive user or device data or abuse system resources. We describe a highly accurate classification approach for detecting malicious Android apps. Our method statically extracts a data-flow feature on how user inputs trigger sensitive API invocations, a property referred to as the user-trigger dependence. Our evaluation with 1433 malware apps and 2684 free popular apps gives a classification accuracy (2.1% false negative rate and 2.0% false positive rate) that is better than, or at least competitive against, the state-of-the-art. Our method also discovers new malicious apps in the Google Play market that cannot be detected by virus scanning tools. Our thesis in this mobile app classification work is to advocate the approach of benign property enforcement, i.e., extracting unique behavioral properties from benign programs and designing corresponding classification policies. (C) 2014 The Authors. Published by Elsevier Ltd.
引用
收藏
页码:255 / 273
页数:19
相关论文
共 34 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
Amos B, 2013, INT WIREL COMMUN, P1666, DOI 10.1109/IWCMC.2013.6583806
[3]  
[Anonymous], 2012, P 10 INT C MOB SYST
[4]  
[Anonymous], 2012, Proceedings of the 19th ACM Conference on Computer and Communications Security, DOI DOI 10.1145/2382196.2382223
[5]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[6]  
[Anonymous], 2012, TRUST TRUSTWORTHY CO
[7]  
Britton Wolfe, 2014, P 17 INT INF SEC C I
[8]  
Chin E, 2011, Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys '11, New York, NY, USA, P239, DOI DOI 10.1145/1999995.2000018
[9]  
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[10]  
Crussell Jonathan, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P37, DOI 10.1007/978-3-642-33167-1_3