Deep learning for image-based mobile malware detection

被引:69
作者
Mercaldo, Francesco [1 ,2 ]
Santone, Antonella [2 ]
机构
[1] CNR, Ist Informat & Telemat, Pisa, Italy
[2] Univ Molise, Dept Biosci & Terr, Pesche, IS, Italy
关键词
Malware; Android; Apple; Security; Machine learning; Deep learning; Artificial intelligence; Image; Classification; MODEL CHECKING;
D O I
10.1007/s11416-019-00346-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Current anti-malware technologies in last years demonstrated their evident weaknesses due to the signature-based approach adoption. Many alternative solutions were provided by the current state of art literature, but in general they suffer of a high false positive ratio and are usually ineffective when obfuscation techniques are applied. In this paper we propose a method aimed to discriminate between malicious and legitimate samples in mobile environment and to identify the belonging malware family and the variant inside the family. We obtain gray-scale images directly from executable samples and we gather a set of features from each image to build several classifiers. We experiment the proposed solution on a data-set of 50,000 Android (24,553 malicious among 71 families and 25,447 legitimate) and 230 Apple (115 samples belonging to 10 families) real-world samples, obtaining promising results.
引用
收藏
页码:157 / 171
页数:15
相关论文
共 66 条
[11]   An ensemble learning approach for brain cancer detection exploiting radiomic features [J].
Brunese, Luca ;
Mercaldo, Francesco ;
Reginelli, Alfonso ;
Santone, Antonella .
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2020, 185
[12]   Formal methods for prostate cancer Gleason score and treatment prediction using radiomic biomarkers [J].
Brunese, Luca ;
Mercaldo, Francesco ;
Reginelli, Alfonso ;
Santone, Antonella .
MAGNETIC RESONANCE IMAGING, 2020, 66 :165-175
[13]   LEILA: Formal Tool for Identifying Mobile Malicious Behaviour [J].
Canfora, Gerardo ;
Martinelli, Fabio ;
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella ;
Visaggio, Corrado Aaron .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (12) :1230-1252
[14]  
Canfora G, 2015, 2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, P27
[15]   Composition-malware: building Android malware at run time [J].
Canfora, Gerardo ;
Mercaldo, Francesco ;
Moriano, Giovanni ;
Visaggio, Corrado Aaron .
PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, :318-326
[16]   De novo reconstruction of gene regulatory networks from time series data, an approach based on formal methods [J].
Ceccarelli, Michele ;
Cerulo, Luigi ;
Santone, Antonella .
METHODS, 2014, 69 (03) :298-305
[17]   Design of New OTP System using homomorphic graph by Changed Location and Angle of Fingerprint Features [J].
Cha, ByungRae ;
Kim, HyungJong ;
Lee, DongSeob .
INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, :63-+
[18]   Talos: no more ransomware victims with formal methods [J].
Cimitile, Aniello ;
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella ;
Visaggio, Corrado Aaron .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (06) :719-738
[19]   Formal Methods Meet Mobile Code Obfuscation Identification of Code Reordering Technique [J].
Cimitile, Aniello ;
Martinelli, Fabio ;
Mercaldo, Francesco ;
Nardone, Vittoria ;
Santone, Antonella .
2017 IEEE 26TH INTERNATIONAL CONFERENCE ON ENABLING TECHNOLOGIES - INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2017, :263-268
[20]   Machine Learning Meets iOS Malware: Identifying Malicious Applications on Apple Environment [J].
Cimitile, Aniello ;
Martinelli, Fabio ;
Mercaldo, Francesco .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :487-492