An Android mutation malware detection based on deep learning using visualization of importance from codes

作者: Yao-Saint Yen , Hung-Min Sun

DOI: 10.1016/J.MICROREL.2019.01.007

关键词: MalwareVisualizationComputer securityStatic analysisControl flowRenameAndroid (operating system)Artificial intelligenceComputer scienceSystem callDeep learning

摘要: Abstract Smartphone use, especially the Android platform, has already got 80% market shares, due to an aforementioned [where?] report, it becomes attacker's primary objective. There is a growing number of storing private data onto smart phones and low safety defense measures, attackers can use multiple ways launch attack user's smartphones. (e.g. Using different coding style confuse malware detecting software). Existing detection methods features, like sensor API, system call, control flow structure information flow, then also machine learning check whether its or not. These features provide app's unique property limitation, that say, from some perspectives might suit for specific attack, but wouldn't others. Nowadays most only one these mostly analyze detect code, facing code confusion zero-day attacks, feature's extraction method may cause wrong judgement. So, it's necessary design effective technique analysis prevent malware. In this paper, we importance words apk, because confusion, rename variables. If using general static cannot judge correctly, values go through our proposed generate image, finally convolutional neural network decide apk file

参考文章(8)
Qi Li, Xiaoyu Li, Android Malware Detection Based on Static Analysis of Characteristic Tree 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. pp. 84- 91 ,(2015) , 10.1109/CYBERC.2015.88
L. Nataraj, S. Karthikeyan, G. Jacob, B. S. Manjunath, Malware images: visualization and automatic classification visualization for computer security. pp. 4- ,(2011) , 10.1145/2016904.2016908
Kyoung Soo Han, Jae Hyun Lim, Boojoong Kang, Eul Gyu Im, Malware analysis using visualized images and entropy graphs International Journal of Information Security. ,vol. 14, pp. 1- 14 ,(2015) , 10.1007/S10207-014-0242-0
KyoungSoo Han, Jae Hyun Lim, Eul Gyu Im, Malware analysis method using visualization of binary files research in adaptive and convergent systems. pp. 317- 321 ,(2013) , 10.1145/2513228.2513294
Mariantonietta La Polla, Fabio Martinelli, Daniele Sgandurra, A Survey on Security for Mobile Devices IEEE Communications Surveys and Tutorials. ,vol. 15, pp. 446- 471 ,(2013) , 10.1109/SURV.2012.013012.00028
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, CERT Siemens, DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23247
Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Jorge Blasco, Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families Expert Systems With Applications. ,vol. 41, pp. 1104- 1117 ,(2014) , 10.1016/J.ESWA.2013.07.106
You Joung Ham, Hyung-Woo Lee, Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events International Journal of Computer and Communication Engineering. ,vol. 3, pp. 149- 154 ,(2014) , 10.7763/IJCCE.2014.V3.310