Fest: A feature extraction and selection tool for Android malware detection

作者: Kai Zhao , Dafang Zhang , Xin Su , Wenjia Li

DOI: 10.1109/ISCC.2015.7405598

关键词:

摘要: Android has become one of the most popular mobile operating systems because numerous applications (apps) it provides. However, malware downloaded from third-party markets threatens users' privacy, and them remain undetected lack efficient accurate detecting techniques. Prior efforts on detection attempted to build precise classification models by manually choosing features, few used any feature selection algorithms help pick typical features. In this paper, we present Feature Extraction Selection Tool (Fest), a feature-based machine learning approach for detection. We first implement extraction tool, AppExtractor, which is designed extract such as permissions or APIs, according predefined rules. Then propose algorithm, FrequenSel. Unlike existing features calculating their importance, FrequenSel selects finding difference frequencies between benign apps, are frequently in rarely apps more important distinguish apps. experiments, evaluate our with 7972 results show that Fest gets nearly 98% accuracy recall, only 2% false alarms. Moreover, takes 6.5s analyze an app common PC, very time-efficient markets.

参考文章(14)
Damien Octeau, William Enck, Patrick McDaniel, Swarat Chaudhuri, A study of android application security usenix security symposium. pp. 21- 21 ,(2011)
Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen, AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale trust and trustworthy computing. pp. 291- 307 ,(2012) , 10.1007/978-3-642-30921-2_17
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing information security. pp. 62- 69 ,(2012) , 10.1109/ASIAJCIS.2012.18
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner, Android permissions demystified Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 627- 638 ,(2011) , 10.1145/2046707.2046779
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, CERT Siemens, DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. network and distributed system security symposium. ,(2014) , 10.14722/NDSS.2014.23247
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
Jinseong Jeon, Kristopher K. Micinski, Jeffrey A. Vaughan, Ari Fogel, Nikhilesh Reddy, Jeffrey S. Foster, Todd Millstein, Dr. Android and Mr. Hide Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12. pp. 3- 14 ,(2012) , 10.1145/2381934.2381938
Avik Chaudhuri, Jeffrey S. Foster, Adam P. Fuchs, SCanDroid: Automated Security Certification of Android ,(2009)
Vaibhav Rastogi, Yan Chen, William Enck, AppsPlayground Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 209- 220 ,(2013) , 10.1145/2435349.2435379