Machine learning-based dynamic analysis of Android apps with improved code coverage

被引:0
作者
Suleiman Y. Yerima
Mohammed K. Alzaylaee
Sakir Sezer
机构
[1] De Montfort University,
[2] Centre for Secure Information Technologies (CSIT),undefined
[3] Queen’s University Belfast,undefined
来源
EURASIP Journal on Information Security | / 2019卷
关键词
Android malware detection; Code coverage; Monkey; DroidBot; Dynamic analysis; Machine learning; Event generation; State-based input generation; Model-based input generation; Random input generation;
D O I
暂无
中图分类号
学科分类号
摘要
This paper investigates the impact of code coverage on machine learning-based dynamic analysis of Android malware. In order to maximize the code coverage, dynamic analysis on Android typically requires the generation of events to trigger the user interface and maximize the discovery of the run-time behavioral features. The commonly used event generation approach in most existing Android dynamic analysis systems is the random-based approach implemented with the Monkey tool that comes with the Android SDK. Monkey is utilized in popular dynamic analysis platforms like AASandbox, vetDroid, MobileSandbox, TraceDroid, Andrubis, ANANAS, DynaLog, and HADM. In this paper, we propose and investigate approaches based on stateful event generation and compare their code coverage capabilities with the state-of-the-practice random-based Monkey approach. The two proposed approaches are the state-based method (implemented with DroidBot) and a hybrid approach that combines the state-based and random-based methods. We compare the three different input generation methods on real devices, in terms of their ability to log dynamic behavior features and the impact on various machine learning algorithms that utilize the behavioral features for malware detection. Experiments performed using 17,444 applications show that overall, the proposed methods provide much better code coverage which in turn leads to more accurate machine learning-based malware detection compared to the state-of- the- art approach.
引用
收藏
相关论文
共 51 条
[1]  
Azim T.(2013)Targeted and depth-first exploration for systematic testing of android apps SIGPLAN Not. 48 641-660
[2]  
Neamtiu I.(2013)DroidAPIMiner: mining API-level features for robust malware detection in Android Security and Privacy in Communication Networks 127 86-103
[3]  
Aafer Y.(2017)Dapasa: detecting android piggybacked apps through sensitive subgraph analysis IEEE Trans. Inf. Forensics Secur. 12 1772-1785
[4]  
Du W.(2015)High accuracy android malware detection using ensemble learning IET Inf. Secur. 9 313-320
[5]  
Yin H.(2015)A probabilistic discriminative model for android malware detection with decompiled source code IEEE Trans. Dependable Secure Comput. 12 400-412
[6]  
Fan M.(2018)Droidfusion: A novel multilevel classifier fusion approach for android malware detection IEEE Trans. Cybern. 49 453-466
[7]  
Liu J.(2010)TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones Osdi ’10 49 1-6
[8]  
Wang W.(2015)Mobiguitar: automated model-based testing of mobile apps IEEE Softw. 32 53-59
[9]  
Li H.(2012)“Andromaly”: a behavioral malware detection framework for android devices J. Intell. Inf. Syst. 38 161-190
[10]  
Tian Z.(2012)MADAM: a multi-level anomaly detector for android malware Lect. Notes Comput. Sci (Incl. subseries Lect. Notes Artif. Intell. Lect. Notes Bioinforma.) 7531 LNCS 240-253