Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

作者: Jean-Francois Lalande , Wojciech Mazurczyk , Marcin Urbanski , Luca Caviglione , Mauro Gaggero

DOI: 10.1109/TIFS.2015.2510825

关键词:

摘要: Modern malware uses advanced techniques to hide from static and dynamic analysis tools. To achieve stealthiness when attacking a mobile device, an effective approach is the use of covert channel built by two colluding applications exchange data locally. Since this process tightly coupled with used hiding method, its detection challenging task, also worsened very low transmission rates. As consequence, it important investigate how reveal presence malicious software using general indicators, such as energy consumed device. In perspective, paper aims spot covertly exchanging methods based on artificial intelligence tools, neural networks decision trees. verify their effectiveness, seven channels have been implemented tested over measurement framework Android devices. Experimental results show feasibility effectiveness proposed detect hidden between applications.

参考文章(48)
Johannes Hoffmann, Stephan Neumann, Thorsten Holz, Mobile Malware Detection Based on Energy Fingerprints -- A Dead End? recent advances in intrusion detection. pp. 348- 368 ,(2013) , 10.1007/978-3-642-41284-4_18
Alessio Merlo, Mauro Migliardi, Luca Caviglione, A survey on energy-aware security mechanisms Pervasive and Mobile Computing. ,vol. 24, pp. 77- 90 ,(2015) , 10.1016/J.PMCJ.2015.05.005
Robert Tibshirani, Trevor Hastie, Jerome H. Friedman, The Elements of Statistical Learning ,(2001)
R. Zoppoli, M. Sanguineti, T. Parisini, Approximating networks and extended Ritz method for the solution of functional optimization problems Journal of Optimization Theory and Applications. ,vol. 112, pp. 403- 440 ,(2002) , 10.1023/A:1013662124879
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Cristiano Cervellera, Mauro Gaggero, Danilo Maccio, An analysis based on F-discrepancy for sampling in regression tree learning international joint conference on neural network. pp. 1115- 1121 ,(2014) , 10.1109/IJCNN.2014.6889665
Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer, Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey Information Security Technical Report. ,vol. 14, pp. 16- 29 ,(2009) , 10.1016/J.ISTR.2009.03.003
Seokjun Lee, Wonwoo Jung, Yohan Chon, Hojung Cha, EnTrack: a system facility for analyzing energy consumption of Android system services ubiquitous computing. pp. 191- 202 ,(2015) , 10.1145/2750858.2807531