Improving Accuracy of Android Malware Detection with Lightweight Contextual Awareness

被引:27
作者
Allen, Joey [1 ]
Landen, Matthew [1 ]
Chaba, Sanya [1 ]
Ji, Yang [1 ]
Chung, Simon Pak Ho [1 ]
Lee, Wenke [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018) | 2018年
关键词
Malware detection; Android Security;
D O I
10.1145/3274694.3274744
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Android malware detection, recent work has shown that using contextual information of sensitive API invocation in the modeling of applications is able to improve the classification accuracy. However, the improvement brought by this context-awareness varies depending on how this information is used in the modeling. In this paper, we perform a comprehensive study on the effectiveness of using the contextual information in prior state-of-the-art detection systems. We find that this information has been "over-used" such that a large amount of non-essential metadata built into the models weakens the generalizability and longevity of the model, thus finally affects the detection accuracy. On the other hand, we find that the entrypoint of API invocation has the strongest impact on the classification correctness, which can further improve the accuracy if being properly captured. Based on this finding, we design and implement a lightweight, circumstance-aware detection system, named "PIKADROID" that only uses the API invocation and its entrypoint in the modeling. For extracting the meaningful entrypoints, PIKADROID applies a set of static analysis techniques to extract and sanitize the reachable entrypoints of a sensitive API, then constructs a frequency model for classification decision. In the evaluation, we show that this slim model significantly improves the detection accuracy on a data set of 23,631 applications by achieving an f-score of 97.41%, while maintaining a false positive rating of 0.96%.
引用
收藏
页码:210 / 221
页数:12
相关论文
共 51 条
[1]  
AAFER Y., 2013, 9 INT C SEC PRIV COM
[2]  
ALLEN J. L., 2016, THESIS
[3]  
Allix K, 2016, 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), P468, DOI [10.1145/2901739.2903508, 10.1109/MSR.2016.056]
[4]  
[Anonymous], P 20 ACM SIGSOFT S F
[5]  
[Anonymous], P 33 ANN COMP SEC AP
[6]  
[Anonymous], 2017, MAMADROID OCT
[7]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[8]  
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[9]  
AVDIIENKO V., 2015, P 37 INT C SOFTW ENG
[10]  
Baxevanis Andreas D., 2004, Bioinformatics: a practical guide to the analysis of genes and proteins, V43