Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection

作者: Gerardo Canfora , Eric Medvet , Francesco Mercaldo , Corrado Aaron Visaggio

DOI: 10.1145/2875475.2875481

关键词: Computer scienceAndroid malwareSoftwareResource consumptionMobile malwareCryptovirologyComputer securityMachine learningMalwareAndroid (operating system)Artificial intelligenceDiscriminative model

摘要: Android malware is becoming very effective in evading detection techniques, and traditional techniques are demonstrating their weaknesses. Signature based shows at least two drawbacks: first, the possible only after has been identified, time needed to produce distribute signature provides attackers with window of opportunities for spreading wild. For solving this problem, different approaches that try characterize malicious behavior through invoked system API calls emerged. Unfortunately, several evasion have proven evade on calls.In paper, we propose an approach capturing terms device resource consumption (using a thorough set features), which much more difficult camouflage. We describe procedure, corresponding practical setting, extracting those features aim maximizing discriminative power. Finally, promising results obtained experimenting than 2000 applications, our exhibited accuracy greater 99%.

参考文章(32)
Bryan Dixon, Yifei Jiang, Abhishek Jaiantilal, Shivakant Mishra, Location based power analysis to detect malicious code in smartphones Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 27- 32 ,(2011) , 10.1145/2046614.2046620
J. Wei, E. Juarez, M. Garrido, F. Pescador, Maximizing the user experience with energy-based fair sharing in battery limited mobile systems IEEE Transactions on Consumer Electronics. ,vol. 59, pp. 690- 698 ,(2013) , 10.1109/TCE.2013.6626257
William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol N. Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones ACM Transactions on Computer Systems. ,vol. 32, pp. 5- ,(2014) , 10.1145/2619091
William G. J. Halfond, Ramesh Govindan, Ding Li, Shuai Hao, Estimating Android applications' CPU energy usage via bytecode profiling Proceedings of the First International Workshop on Green and Sustainable Software. pp. 1- 7 ,(2012) , 10.5555/2663779.2663780
Anshul Arora, Shree Garg, Sateesh K. Peddoju, Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices next generation mobile applications, services and technologies. pp. 66- 71 ,(2014) , 10.1109/NGMAST.2014.57
Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio, A Classifier of Malicious Android Applications availability, reliability and security. pp. 607- 614 ,(2013) , 10.1109/ARES.2013.80
Amine Boukhtouta, Nour-Eddine Lakhdari, Mourad Debbabi, Inferring Malware Family through Application Protocol Sequences Signature new technologies, mobility and security. pp. 1- 5 ,(2014) , 10.1109/NTMS.2014.6814026
Michael Spreitzenbarth, Felix Freiling, Florian Echtler, Thomas Schreck, Johannes Hoffmann, Mobile-sandbox: having a deeper look into android applications acm symposium on applied computing. pp. 1808- 1815 ,(2013) , 10.1145/2480362.2480701
Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen, VirusMeter: Preventing Your Cellphone from Spies recent advances in intrusion detection. pp. 244- 264 ,(2009) , 10.1007/978-3-642-04342-0_13
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, CERT Siemens, DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23247