Behavioral classification of Android applications using system calls

被引:3
作者
Razgallah, Asma [1 ]
Khoury, Raphael [1 ]
机构
[1] Univ Quebec Chicoutimi, Dept Comp Sci & Math, Saguenay, PQ, Canada
来源
2021 28TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2021) | 2021年
关键词
Android; system calls; classification; security;
D O I
10.1109/APSEC53868.2021.00012
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The exponential growth in the number of Android applications on the market has been matching with a corresponding growth in malicious application. Of particular concern is the risk of application repackaging, a process by which cybercriminals downloads, modifies and republishes an application that already exists on the store with the addition of malicious code. Dynamic detection in system call traces, based on machine learning models has emerged as a promising solution. In this paper, we introduce a novel abstraction process, and demonstrate that it improves the classification process by replicating multiples malware detection techniques from the literature. We further propose a novel classification method, based on our observation that malware triggers specific system calls at different points than benign programs. We further make our dataset available for future researchers.
引用
收藏
页码:43 / 52
页数:10
相关论文
共 37 条
[1]   A Review on Android Ransomware Detection Using Deep Learning Techniques [J].
Alzahrani, Nisreen ;
Alghazzawi, Daniyal .
11TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS (MEDES), 2019, :330-335
[2]   Enhancing malware detection for Android systems using a system call filtering and abstraction process [J].
Amamra, Abdelfattah ;
Robert, Jean-Marc ;
Talhi, Chamseddine .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) :1179-1192
[3]   SysDroid: a dynamic ML-based android malware analyzer using system call traces [J].
Ananya, A. ;
Aswathy, A. ;
Amal, T. R. ;
Swathy, P. G. ;
Vinod, P. ;
Shojafar, Mohammad .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (04) :2789-2808
[4]  
[Anonymous], 1994, Ann Arbor MI
[5]  
[Anonymous], 2014, GENYMOTION ANDROID E
[6]  
[Anonymous], 2014, Measuring the Digital Economy, DOI [DOI 10.1787/9789264221796-EN, 10. 1787/9789264221796-en]
[7]  
Arshad S, 2016, INT J ADV COMPUT SC, V7, P463
[8]  
Bhatia T, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), DOI 10.1109/CyberSecPODS.2017.8074847
[9]  
Canfora Gerardo, 2015, P 3 INT WORKSH SOFTW, P13
[10]  
Chaba Sanya, 2017, ABS170908805