Improving dynamic analysis of android apps using hybrid test input generation

作者: Mohammed K. Alzaylaee , Suleiman Y. Yerima , Sakir Sezer

DOI: 10.1109/CYBERSECPODS.2017.8074845

关键词: MalwareComputer scienceApplication securityHybrid systemComputer securityCode coverageAndroid (operating system)Hybrid approachAndroid malwareEmbedded systemTest input

摘要: The Android OS has become the most popular mobile operating system leading to a significant increase in spread of malware. Consequently, several static and dynamic analysis systems have been developed detect With analysis, efficient test input generation is needed order trigger potential run-time malicious behaviours. Most existing employ random-based methods usually built using Monkey tool. Random-based shortcomings including limited code coverage, which motivates us explore combining it with state-based method improve efficiency. Hence, this paper, we present novel hybrid approach designed on real devices. We implemented by integrating random based tool (Monkey) state (DroidBot) coverage potentially uncover more evaluated 2,444 apps containing 1222 benign malware samples from genome project. Three scenarios, only, our proposed were investigated comparatively evaluate their performances. Our study shows that significantly improved amount features extracted both over commonly used method.

参考文章(21)
Suleiman Y. Yerima, Sakir Sezer, Igor Muttik, Android malware detection: An eigenspace analysis approach science and information conference. pp. 1236- 1242 ,(2015) , 10.1109/SAI.2015.7237302
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Suleiman Y. Yerima, Igor Muttik, Sakir Sezer, High Accuracy Android Malware Detection Using Ensemble Learning Iet Information Security. ,vol. 9, pp. 313- 320 ,(2015) , 10.1049/IET-IFS.2014.0099
Axelle Apvrille, Tim Strazzere, Reducing the window of opportunity for Android malware Gotta catch 'em all Journal of Computer Virology and Hacking Techniques. ,vol. 8, pp. 61- 71 ,(2012) , 10.1007/S11416-012-0162-3
Aravind Machiry, Rohan Tahiliani, Mayur Naik, Dynodroid: an input generation system for Android apps foundations of software engineering. pp. 224- 234 ,(2013) , 10.1145/2491411.2491450
Kimberly Tam, Salahuddin J. Khan, Aristide Fattori, Lorenzo Cavallaro, CopperDroid: Automatic Reconstruction of Android Malware Behaviors network and distributed system security symposium. ,(2015) , 10.14722/NDSS.2015.23145
Domenico Amalfitano, Anna Rita Fasolino, Porfirio Tramontana, Salvatore De Carmine, Atif M. Memon, Using GUI ripping for automated testing of Android applications Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering - ASE 2012. pp. 258- 261 ,(2012) , 10.1145/2351676.2351717
Wontae Choi, George Necula, Koushik Sen, Guided GUI testing of android apps with minimal restart and approximate learning conference on object oriented programming systems languages and applications. ,vol. 48, pp. 623- 640 ,(2013) , 10.1145/2509136.2509552
Shuai Hao, Bin Liu, Suman Nath, William G.J. Halfond, Ramesh Govindan, PUMA: programmable UI-automation for large-scale dynamic analysis of mobile apps international conference on mobile systems, applications, and services. pp. 204- 217 ,(2014) , 10.1145/2594368.2594390