Detection and Identification of Android Malware Based on Information Flow Monitoring

被引:10
作者
Andriatsimandefitra, Radoniaina [1 ]
Valerie Viet Triem Tong [1 ]
机构
[1] INRIA, CIDRE Res Grp, Cent Supelec, Saclay, France
来源
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD) | 2015年
关键词
Malware detection; Malware classification; Android; Information Flow;
D O I
10.1109/CSCloud.2015.27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information flow monitoring has been mostly used to detect privacy leaks. In a previous work, we showed that they can also be used to characterize Android malware behaviours and in the current one we show that these flows can also be used to detect and identify Android malware. The characterization consists in computing automatically System Flow Graphs that describe how a malware disseminates its data in the system. In the current work, we propose a method that uses these SFG-based malware profile to detect the execution of Android malware by monitoring the information flows they cause in the system. We evaluated our method by monitoring the execution of 39 malware samples and 70 non malicious applications. Our results show that our approach detected the execution of all the malware samples and did not raise any false alerts for the 70 non malicious applications.
引用
收藏
页码:200 / 203
页数:4
相关论文
共 50 条
[41]   A Two-Layered Malware Detection Model Based on Permission for Android [J].
Lu, Tianliang ;
Hou, Su .
2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2018, :239-243
[42]   Android Malware Detection Based on System Calls Analysis and CNN Classification [J].
Abderrahmane, Abada ;
Adnane, Guettaf ;
Yacine, Challal ;
Khireddine, Garri .
2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOP (WCNCW), 2019,
[43]   A Novel Android Malware Detection Method Based on Visible User Interface [J].
Tan, Shuaishuai ;
Tian, Zhiyi ;
Zhong, Xiaoxiong ;
Yu, Shui ;
Zhang, Weizhe ;
Dong, Guozhong .
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, :659-666
[44]   Android Malware Detection Based on Structural Features of the Function Call Graph [J].
Yang, Yang ;
Du, Xuehui ;
Yang, Zhi ;
Liu, Xing .
ELECTRONICS, 2021, 10 (02) :1-18
[45]   Android Malware Detection Methods Based on Convolutional Neural Network: A Survey [J].
Shu, Longhui ;
Dong, Shi ;
Su, Huadong ;
Huang, Junjie .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2023, 7 (05) :1330-1350
[46]   EfficientNet convolutional neural networks-based Android malware detection [J].
Yadav, Pooja ;
Menon, Neeraj ;
Ravi, Vinayakumar ;
Vishvanathan, Sowmya ;
Pham, Tuan D. .
COMPUTERS & SECURITY, 2020, 115
[47]   Permissions-based Android malware detection using machine learning [J].
Alomar, Atheer ;
AlJarullah, Asma ;
Abu-Ghazalah, Sarah .
Neural Computing and Applications, 2025, 37 (06) :5255-5270
[48]   HGNNDroid: Android Malware Detection Based on Heterogeneous Graph Neural Network [J].
Liu, Xingyu ;
Liu, Xiaozhen ;
Hao, Kegang ;
Wang, Ke ;
Chen, Xinglong ;
Niu, Weina .
2024 IEEE 9TH INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE, DSC, 2024, :378-384
[49]   A Novel Android Malware Detection Approach Based on Convolutional Neural Network [J].
Zhang, Yi ;
Yang, Yuexiang ;
Wang, Xiaolei .
ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, :144-149
[50]   Linear SVM-Based Android Malware Detection [J].
Ham, Hyo-Sik ;
Kim, Hwan-Hee ;
Kim, Myung-Sup ;
Choi, Mi-Jung .
FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 :575-585