Deep learning for image-based mobile malware detection

被引:1
作者
Francesco Mercaldo
Antonella Santone
机构
[1] Consiglio Nazionale delle Ricerche,Istituto di Informatica e Telematica
[2] University of Molise,Department of Biosciences and Territory
来源
Journal of Computer Virology and Hacking Techniques | 2020年 / 16卷
关键词
Malware; Android; Apple; Security; Machine learning; Deep learning; Artificial intelligence; Image; Classification;
D O I
暂无
中图分类号
学科分类号
摘要
Current anti-malware technologies in last years demonstrated their evident weaknesses due to the signature-based approach adoption. Many alternative solutions were provided by the current state of art literature, but in general they suffer of a high false positive ratio and are usually ineffective when obfuscation techniques are applied. In this paper we propose a method aimed to discriminate between malicious and legitimate samples in mobile environment and to identify the belonging malware family and the variant inside the family. We obtain gray-scale images directly from executable samples and we gather a set of features from each image to build several classifiers. We experiment the proposed solution on a data-set of 50,000 Android (24,553 malicious among 71 families and 25,447 legitimate) and 230 Apple (115 samples belonging to 10 families) real-world samples, obtaining promising results.
引用
收藏
页码:157 / 171
页数:14
相关论文
共 101 条
[1]  
Arzt S(2014)Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps ACM SIGPLAN Not. 49 259-269
[2]  
Rasthofer S(2005)Reduced models for efficient CCS verification Form. Methods Syst. Des. 26 319-350
[3]  
Fritz C(2020)An ensemble learning approach for brain cancer detection exploiting radiomic features Comput. Methods Programs Biomed. 185 105134-1252
[4]  
Bodden E(2018)Leila: formal tool for identifying mobile malicious behaviour IEEE Trans. Softw. Eng. 45 1230-305
[5]  
Bartel A(2014)De novo reconstruction of gene regulatory networks from time series data, an approach based on formal methods Methods 69 298-20
[6]  
Klein J(2017)Talos: no more ransomware victims with formal methods Int. J. Inf. Secur. 17 1-1286
[7]  
Le Traon Y(2019)Model checking for data anomaly detection Procedia Comput. Sci. 159 1277-96
[8]  
Octeau D(2014)Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones ACM Trans. Comput. Syst. (TOCS) 32 5-1052
[9]  
McDaniel P(2018)Human behavior characterization for driving style recognition in vehicle system Comput. Elec. Eng. 15 77-134
[10]  
Barbuti R(2019)Music classification as a new approach for malware detection J. Comput. Virol. Hacking Tech. 159 1045-14