A Systematic Literature Review of Android Malware Detection Using Static Analysis

被引:89
作者
Pan, Ya [1 ]
Ge, Xiuting [1 ,2 ]
Fang, Chunrong [2 ]
Fan, Yong [1 ]
机构
[1] Southwest Univ Sci & Technol, Dept Comp Sci & Technol, Mianyang 621000, Sichuan, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware; Static analysis; Feature extraction; Analytical models; Bibliographies; Sensitivity; Systematics; Android malware detection; static analysis; systematic literature review; ENSEMBLE; APPS; FRAMEWORK; FEATURES; GRAPH;
D O I
10.1109/ACCESS.2020.3002842
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android malware has been in an increasing trend in recent years due to the pervasiveness of Android operating system. Android malware is installed and run on the smartphones without explicitly prompting the users or without the user's permission, and it poses great threats to users such as the leakage of personal information and advanced fraud. To address these threats, various techniques are proposed by researchers and practitioners. Static analysis is one of these techniques, which is widely applied to Android malware detection and can detect malware quickly and prohibit malware before installation. To provide a clarified overview of the latest work in Android malware detection using static analysis, we perform a systematic literature review by identifying 98 studies from January 2014 to March 2020. Based on the features of applications, we first divide static analysis in Android malware detection into four categories, which include Android characteristic-based method, opcode-based method, program graph-based method, and symbolic execution-based method. Then we assess the malware detection capability of static analysis, and we compare the performance of different models in Android malware detection by analyzing the results of empirical evidence. Finally, it is concluded that static analysis is effective to detect Android malware. Moreover, there is a preliminary result that neural network model outperforms the non-neural network model in Android malware detection. However, static analysis still faces many challenges. Thus, it is necessary to derive some novel techniques for improving Android malware detection based on the current research community. Moreover, it is essential to establish a unified platform that is used to evaluate the performance of a series of techniques in Android malware detection fairly.
引用
收藏
页码:116363 / 116379
页数:17
相关论文
共 114 条
[1]   Mining nested flow of dominant APIs for detecting android malware [J].
Alam, Shahid ;
Alharbi, Soltan Abed ;
Yildirim, Serdar .
COMPUTER NETWORKS, 2020, 167
[2]   Annotated Control Flow Graph for Metamorphic Malware Detection [J].
Alam, Shahid ;
Traore, Issa ;
Sogukpinar, Ibrahim .
COMPUTER JOURNAL, 2015, 58 (10) :2608-2621
[3]  
Ali-Gombe A., 2016, P 5 PROGR PROT REV E, P1
[4]   Empirical assessment of machine learning-based malware detectors for Android Measuring the gap between in-the-lab and in-the-wild validation scenarios [J].
Allix, Kevin ;
Bissyande, Tegawende F. ;
Jerome, Quentin ;
Klein, Jacques ;
State, Radu ;
Le Traon, Yves .
EMPIRICAL SOFTWARE ENGINEERING, 2016, 21 (01) :183-211
[5]   Identifying Malicious Software Using Deep Residual Long-Short Term Memory [J].
Alotaibi, Aziz .
IEEE ACCESS, 2019, 7 :163128-163137
[6]   Static malware detection and attribution in android byte-code through an end-to-end deep system [J].
Amin, Muhammad ;
Tanveer, Tamleek Ali ;
Tehseen, Mohammad ;
Khan, Murad ;
Khan, Fakhri Alam ;
Anwar, Sajid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 102 :112-126
[7]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[8]   SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [J].
Arshad, Saba ;
Shah, Munam A. ;
Wahid, Abdul ;
Mehmood, Amjad ;
Song, Houbing ;
Yu, Hongnian .
IEEE ACCESS, 2018, 6 :4321-4339
[9]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[10]  
Arzt Steven., 2015, Proceedings of the 4th ACM SIGPLAN International Workshop on State of the Art in Program Analysis, P1