Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods

作者: Yu Liu , Kai Guo , Xiangdong Huang , Zhou Zhou , Yichi Zhang

DOI: 10.1155/2018/1649703

关键词:

摘要: In order to tackle the security issues caused by malwares of Android OS, we proposed a high-efficient hybrid-detecting scheme for malwares. Our employed different analyzing methods (static and dynamic methods) construct flexible detecting scheme. this paper, some techniques such as Com+ feature based on traditional Permission API call features improve performance static detection. The collapsing issue function graph-based malware detection was also avoided, adopted selection clustering method unify graph various dimensions into same dimension. verify our scheme, built an open-access dataset in experiments. experimental results showed that suggested achieved high malware-detecting accuracy, could be used establish cloud services, which can automatically adopt high-efficiency according properties applications.

参考文章(9)
Anil K. Jain, Data clustering: 50 years beyond K-means international conference on pattern recognition. ,vol. 31, pp. 651- 666 ,(2010) , 10.1016/J.PATREC.2009.09.011
Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan, Android Security: A Survey of Issues, Malware Penetration, and Defenses IEEE Communications Surveys and Tutorials. ,vol. 17, pp. 998- 1022 ,(2015) , 10.1109/COMST.2014.2386139
William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol N. Sheth, TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones ACM Transactions on Computer Systems. ,vol. 32, pp. 5- ,(2014) , 10.1145/2619091
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection IEEE Transactions on Information Forensics and Security. ,vol. 9, pp. 1869- 1882 ,(2014) , 10.1109/TIFS.2014.2353996
You Joung Ham, Daeyeol Moon, Hyung-Woo Lee, Jae Deok Lim, Jeong Nyeo Kim, Android Mobile Application System Call Event Pattern Analysis for Determination of Malicious Attack International journal of security and its applications. ,vol. 8, pp. 231- 246 ,(2014) , 10.14257/IJSIA.2014.8.1.22
Shihong Zou, Jing Zhang, Xiaodong Lin, An effective behavior-based Android malware detection system Security and Communication Networks. ,vol. 8, pp. 2079- 2089 ,(2015) , 10.1002/SEC.1155
Alireza Sadeghi, Hamid Bagheri, Joshua Garcia, Sam Malek, A Taxonomy and Qualitative Comparison of Program Analysis Techniques for Security Assessment of Android Software IEEE Transactions on Software Engineering. ,vol. 43, pp. 492- 530 ,(2017) , 10.1109/TSE.2016.2615307
Mahmudur Rahman, Mizanur Rahman, Bogdan Carbunar, Duen Horng Chau, Search Rank Fraud and Malware Detection in Google Play IEEE Transactions on Knowledge and Data Engineering. ,vol. 29, pp. 1329- 1342 ,(2017) , 10.1109/TKDE.2017.2667658
Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu, Context-Aware, Adaptive, and Scalable Android Malware Detection Through Online Learning IEEE Transactions on Emerging Topics in Computational Intelligence. ,vol. 1, pp. 157- 175 ,(2017) , 10.1109/TETCI.2017.2699220