A3CM: Automatic Capability Annotation for Android Malware

被引:24
|
作者
Qiu, Junyang [1 ]
Zhang, Jun [2 ]
Luo, Wei [1 ]
Pan, Lei [1 ]
Nepal, Surya [3 ]
Wang, Yu [4 ]
Xiang, Yang [2 ]
机构
[1] Deakin Univ, Sch Informat Technol, Geelong, Vic 3216, Australia
[2] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
[3] CSIRO, Data61, Sydney, NSW 1710, Australia
[4] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
中国国家自然科学基金;
关键词
Malware; Feature extraction; Smart phones; Machine learning; Semantics; Security; Australia; Android malware; security; privacy-related capability; multi-label learning; malicious capability prediction; zero-day-family malware; DETECTION SYSTEM; FRAMEWORK;
D O I
10.1109/ACCESS.2019.2946392
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android malware poses serious security and privacy threats to the mobile users. Traditional malware detection and family classification technologies are becoming less effective due to the rapid evolution of the malware landscape, with the emerging of so-called zero-day-family malware families. To address this issue, our paper presents a novel research problem on automatically identifying the security/privacy-related capabilities of any detected malware, which we refer to as Malware Capability Annotation (MCA). Motivated by the observation that known and zero-day-family malware families share the security/privacy-related capabilities, MCA opens a new alternative way to effectively analyze zero-day-family malware (the malware that do not belong to any existing families) through exploring the related information and knowledge from known malware families. To address the MCA problem, we design a new MCA hunger solution, Automatic Capability Annotation for Android Malware (A3CM). A3CM works in the following four steps: 1) A3CM automatically extracts a set of semantic features such as permissions, API calls, network addresses from raw binary APKs to characterize malware samples; 2) A3CM applies a statistical embedding method to map the features into a joint feature space, so that malware samples can be represented as numerical vectors; 3) A3CM infers the malicious capabilities by using the multi-label classification model; 4) The trained multi-label model is used to annotate the malicious capabilities of the candidate malware samples. To facilitate the new research of MCA, we create a new ground truth dataset that consists of 6,899 annotated Android malware samples from 72 families. We carry out a large number of experiments based on the four representative security/privacy-related capabilities to evaluate the effectiveness of A3CM. Our results show that A3CM can achieve promising accuracy of 1.00, 0.98 and 0.63 in inferring multiple capabilities of known Android malware, small size-families' malware and zero-day-families' Android malware, respectively.
引用
收藏
页码:147156 / 147168
页数:13
相关论文
共 13 条
  • [1] A3: Automatic Analysis of Android Malware
    Zhang, Luoshi
    Niu, Yan
    Wu, Xiao
    Wang, Zhaoguo
    Xue, Yibo
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 89 - 93
  • [2] A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning
    Ibrahim, Mulhem
    Issa, Bayan
    Jasser, Muhammed Basheer
    IEEE ACCESS, 2022, 10 : 117334 - 117352
  • [3] ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures
    Karbab, ElMouatez Billah
    Debbabi, Mourad
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [4] Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence
    Park, Jungsoo
    Vu, Long Nguyen
    Bencivengo, George
    Jung, Souhwan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (08): : 3420 - 3436
  • [5] MalDozer: Automatic framework for android malware detection using deep learning
    Karbab, ElMouatez Billah
    Debbabi, Mourad
    Derhab, Abdelouahid
    Mouheb, Djedjiga
    DIGITAL INVESTIGATION, 2018, 24 : S48 - S59
  • [6] TaintBench: Automatic real-world malware benchmarking of Android taint analyses
    Linghui Luo
    Felix Pauck
    Goran Piskachev
    Manuel Benz
    Ivan Pashchenko
    Martin Mory
    Eric Bodden
    Ben Hermann
    Fabio Massacci
    Empirical Software Engineering, 2022, 27
  • [7] TaintBench: Automatic real-world malware benchmarking of Android taint analyses
    Luo, Linghui
    Pauck, Felix
    Piskachev, Goran
    Benz, Manuel
    Pashchenko, Ivan
    Mory, Martin
    Bodden, Eric
    Hermann, Ben
    Massacci, Fabio
    EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (01)
  • [8] Advanced 3D Visualization of Android Malware Families
    Basurto, Nuno
    Quintian, Hector
    Urda, Daniel
    Calvo-Rolle, Jose Luis
    Herrero, Alvaro
    Corchado, Emilio
    14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021), 2022, 1400 : 167 - 177
  • [9] RepassDroid: Automatic Detection of Android Malware Based on Essential Permissions and Semantic Features of Sensitive APIs
    Xie, Niannian
    Zeng, Fanping
    Qin, Xiaoxia
    Zhang, Yu
    Zhou, Mingsong
    Lv, Chengcheng
    PROCEEDINGS 2018 12TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2018), 2018, : 52 - 59
  • [10] SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System
    Arshad, Saba
    Shah, Munam A.
    Wahid, Abdul
    Mehmood, Amjad
    Song, Houbing
    Yu, Hongnian
    IEEE ACCESS, 2018, 6 : 4321 - 4339