DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans

被引:7
作者
Bai, Chongyang [1 ]
Han, Qian [1 ]
Mezzour, Ghita [2 ,3 ]
Pierazzi, Fabio [4 ,5 ]
Subrahmanian, V. S. [1 ]
机构
[1] Dartmouth Coll, Inst Secur Technol & Soc, Dept Comp Sci, Hanover, NH 03755 USA
[2] Univ Int Rabat, Dept Comp Sci & Logist, Sala El Ladida 11100, Morocco
[3] Univ Int Rabat, TICLab, Sala El Ladida 11100, Morocco
[4] Kings Coll London, London WC2R 2LS, England
[5] Royal Holloway Univ London, Egham TW20 0EX, Surrey, England
基金
英国工程与自然科学研究理事会;
关键词
Android banking trojans; machine learning; graph models; malware; MALWARE DETECTION;
D O I
10.1109/TDSC.2019.2909902
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Using a novel dataset of Android banking trojans (ABTs), other Android malware, and goodware, we develop the DBank systemto predict whether a given Android APK is a banking trojan or not. We introduce the novel concept of a Triadic Suspicion Graph (TSG for short) which contains three kinds of nodes: goodware, banking trojans, and API packages. We develop a novel feature space based on two classes of scores derived from TSGs: suspicion scores (SUS) and suspicion ranks (SR)-the latter yields a family of features that generalize PageRank. While TSG features (based on SUS/SR scores) provide very high predictive accuracy on their own in predicting recent (2016-2017) ABTs, we show that the combination of TSG features with previously studied lightweight static and dynamic features in the literature yields the highest accuracy in distinguishing ABTs from goodware, while preserving the same accuracy of prior feature combinations in distinguishing ABTs from other Android malware. In particular, DBank's overall accuracy in predicting whether an APK is a banking trojan or not is up to 99.9% AUC with 0.3% false positive rate. Moreover, we have already reported two unlabeled APKs from VirusTotal (which DBank has detected as ABTs) to the Google Android Security Team-in one case, we discovered it before any of the 63 anti-virus products on VirusTotal did, and in the other case, we beat 62 of 63 anti-viruses on VirusTotal. This suggests that DBank is capable of making new discoveries in the wild before other established vendors. We also show that our novel TSG features have some interesting defensive properties as they are robust to knowledge of the training set by an adversary: even if the adversary uses 90% of our training set and uses the exact TSG features that we use, it is difficult for him to infer DBank's predictions on APKs. We additionally identify the features that best separate and characterize ABTs from goodware as well as from other Android malware. Finally, we develop a detailed data-driven analysis of five major recent ABT families: FakeToken, Svpeng, Asacub, BankBot, and Marcher, and identify the features that best separate them from goodware and other-malware.
引用
收藏
页码:1378 / 1393
页数:16
相关论文
共 37 条
[1]  
A. P. Documentation, API PACKAGE LIST
[2]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[3]   Drebin: Effective and Explainable Detection of Android Malware in Your Pocket [J].
Arp, Daniel ;
Spreitzenbarth, Michael ;
Huebner, Malte ;
Gascon, Hugo ;
Rieck, Konrad .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[4]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2594291.2594299, 10.1145/2666356.2594299]
[5]   STAMBA: Security Testing for Android Mobile Banking Apps [J].
Bojjagani, Sriramulu ;
Sastry, V. N. .
ADVANCES IN SIGNAL PROCESSING AND INTELLIGENT RECOGNITION SYSTEMS (SIRS-2015), 2016, 425 :671-683
[6]  
Buescher A, 2011, LECT NOTES COMPUT SC, V6961, P262, DOI 10.1007/978-3-642-23644-0_14
[7]  
Burguera I., 2011, P 1 ACM WORKSH SEC P, P15, DOI [10.1145/2046614.2046619, DOI 10.1145/2046614.2046619]
[8]   A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code [J].
Cen, Lei ;
Gates, Christoher S. ;
Si, Luo ;
Li, Ninghui .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (04) :400-412
[9]  
Chakraborty T., 2017, IEEE T DEPEND SECURE
[10]   DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper) [J].
Coletta, Alberto ;
van der Veen, Victor ;
Maggi, Federico .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2016, 2017, 9603 :250-259