CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.

作者: Cong Sun , Jun Chen , Pengbin Feng , Jianfeng Ma

DOI: 10.1007/978-3-030-30619-9_6

关键词:

摘要: The explosive growth of Android malware has led to a strong interest in developing efficient and precise detection approach. Recent efforts have shown that machine learning-based classification is promising direction, the API-level features are extremely representative discriminate been drastically used different forms. In this work, we implement light-weight system, CatraDroid, recovers semantics at call graph level classify applications. CatraDroid leverages text mining technique capture list sensitive APIs from knowledge consisting exploits databases, code samples, configurations codebases. It builds complete for applications identifies traces entry methods API calls. Using as features, our approach can effectively benign Through evaluation, demonstrated outperforms state-of-art approach, with high-quality extracted by static analysis.

参考文章(31)
Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip Porras, DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications european symposium on research in computer security. pp. 163- 182 ,(2014) , 10.1007/978-3-319-11203-9_10
Matthew Wiener, Andy Liaw, Classification and Regression by randomForest ,(2007)
George H. John, Pat Langley, Estimating continuous distributions in Bayesian classifiers uncertainty in artificial intelligence. pp. 338- 345 ,(1995)
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Damien Octeau, Somesh Jha, Patrick McDaniel, Retargeting Android applications to Java bytecode Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering - FSE '12. pp. 6- ,(2012) , 10.1145/2393596.2393600
Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen, EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework network and distributed system security symposium. ,(2015) , 10.14722/NDSS.2015.23140
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Zhengyang Qu, Vaibhav Rastogi, Xinyi Zhang, Yan Chen, Tiantian Zhu, Zhong Chen, AutoCog: Measuring the Description-to-permission Fidelity in Android Applications computer and communications security. pp. 1354- 1365 ,(2014) , 10.1145/2660267.2660287
Fengguo Wei, Sankardas Roy, Xinming Ou, Robby, Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps computer and communications security. pp. 1329- 1341 ,(2014) , 10.1145/2660267.2660357