The rise of obfuscated Android malware and impacts on detection methods

被引:16
作者
Elsersy, Wael F. [1 ]
Feizollah, Ali [1 ]
Anuar, Nor Badrul [1 ]
机构
[1] Univ Malaya, Dept Comp Syst & Technol, Fac Comp Sci & Informat Technol, Kuala Lumpur, Wilayah Perseku, Malaysia
关键词
Android malware; Android security; Evasion techniques; Machine learning; Obfuscation techniques; DEEP LEARNING-METHOD; HYBRID APPROACH; SYSTEM; FEATURES; CODE; SIGNATURE; FRAMEWORK; ANALYZER; ATTACKS; THREAT;
D O I
10.7717/peerj-cs.907
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious code. Therefore, Android applications developers tend to use state-of-the-art obfuscation techniques to mitigate the risk of application plagiarism. The malware authors adopt the obfuscation and transformation techniques to defeat the anti-malware detections, which this paper refers to as evasions. Malware authors use obfuscation techniques to generate new malware variants from the same malicious code. The concern of encountering difficulties in malware reverse engineering motivates researchers to secure the source code of benign Android applications using evasion techniques. This study reviews the state-of-the-art evasion tools and techniques. The study criticizes the existing research gap of detection in the latest Android malware detection frameworks and challenges the classification performance against various evasion techniques. The study concludes the research gaps in evaluating the current Android malware detection framework robustness against state-of-the-art evasion techniques. The study concludes the recent Android malware detection-related issues and lessons learned which require researchers' attention in the future.
引用
收藏
页数:61
相关论文
共 237 条
  • [1] Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
  • [2] Abaid Z, 2017, 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), P375
  • [3] Intelligent Approach for Android Malware Detection
    Abdulla, Shubair
    Altaher, Altyeb
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (08): : 2964 - 2983
  • [4] Abraham A, 2015, 2015 10TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE), P119, DOI 10.1109/MALWARE.2015.7413692
  • [5] Abuthawabeh MKA, 2019, INT ARAB CONF INF TE, P42, DOI [10.1109/acit47987.2019.8991114, 10.1109/ACIT47987.2019.8991114]
  • [6] Adebayo OS, 2014, 2014 4TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), P123, DOI 10.1109/WICT.2014.7077314
  • [7] DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware
    Afifi, Firdaus
    Anuar, Nor Badrul
    Shamshirband, Shahaboddin
    Choo, Kim-Kwang Raymond
    [J]. PLOS ONE, 2016, 11 (09):
  • [8] Identifying Android malware using dynamically obtained features
    Afonso, Vitor Monte
    de Amorim, Matheus Favero
    Abed Gregio, Andre Ricardo
    Junquera, Glauco Barroso
    de Geus, Paulo Licio
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (01): : 9 - 17
  • [9] Agman Y, 2021, BPFROID ROBUST REAL
  • [10] Akpojaro J, 2014, T MACH LEARN ARTIF I, V2, P20, DOI [10.14738/tmlai.23.206, DOI 10.14738/TMLAI.23.206]