Android Malware Detection Using Fine-Grained Features

作者: Xu Jiang , Baolei Mao , Jun Guan , Xingli Huang

DOI: 10.1155/2020/5190138

关键词:

摘要: Nowadays, Android applications declare as many permissions possible to provide more function for the users, which also poses severe security threat them. Although malware detection methods based on have been developed, they are ineffective when malicious few dangerous or declared by similar with those benign applications. This limitation is attributed use of too information classification. We propose a new method named fine-grained permission (FDP) detecting applications, gathers features that better represent difference between and Among these features, feature applied in components proposed first time. evaluate 1700 1600 demonstrate FDP achieves TP rate 94.5%. Furthermore, compared other related approaches, can detect families only requires 15.205 s analyze one application average, demonstrates its applicability practical implementation.

参考文章(16)
Veelasha Moonsamy, Jia Rong, Shaowu Liu, Mining permission patterns for contrasting clean and malicious android applications Future Generation Computer Systems. ,vol. 36, pp. 122- 132 ,(2014) , 10.1016/J.FUTURE.2013.09.014
Vitor Monte Afonso, Matheus Favero de Amorim, André Ricardo Abed Grégio, Glauco Barroso Junquera, Paulo Lício de Geus, Identifying Android malware using dynamically obtained features Journal of Computer Virology and Hacking Techniques. ,vol. 11, pp. 9- 17 ,(2015) , 10.1007/S11416-014-0226-7
William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol N. Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones ACM Transactions on Computer Systems. ,vol. 32, pp. 5- ,(2014) , 10.1145/2619091
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 1869- 1882 ,(2014) , 10.1109/TIFS.2014.2353996
Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Guillermo Suarez-Tangil, Steven Furnell, AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection Computers & Security. ,vol. 65, pp. 121- 134 ,(2017) , 10.1016/J.COSE.2016.11.007
Guanhong Tao, Zibin Zheng, Ziying Guo, Michael R. Lyu, MalPat: Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs IEEE Transactions on Reliability. ,vol. 67, pp. 355- 369 ,(2018) , 10.1109/TR.2017.2778147
Yu Liu, Kai Guo, Xiangdong Huang, Zhou Zhou, Yichi Zhang, Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods Mobile Information Systems. ,vol. 2018, pp. 1- 12 ,(2018) , 10.1155/2018/1649703
Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-an, Heng Ye, Significant Permission Identification for Machine-Learning-Based Android Malware Detection IEEE Transactions on Industrial Informatics. ,vol. 14, pp. 3216- 3225 ,(2018) , 10.1109/TII.2017.2789219
Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features IEEE Access. ,vol. 6, pp. 31798- 31807 ,(2018) , 10.1109/ACCESS.2018.2835654
Qing Yang, Ge Peng, Paolo Gasti, Kiran S. Balagani, Yantao Li, Gang Zhou, MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones IEEE Transactions on Information Forensics and Security. ,vol. 14, pp. 913- 922 ,(2019) , 10.1109/TIFS.2018.2868221