EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

作者: Mohammed K. Alzaylaee , Suleiman Y. Yerima , Sakir Sezer

DOI: 10.1145/3041008.3041010

关键词:

摘要: The Android operating system has become the most popular for smartphones and tablets leading to a rapid rise in malware. Sophisticated malware employ detection avoidance techniques order hide their malicious activities from analysis tools. These include wide range of anti-emulator techniques, where programs attempt by detecting emulator. For this reason, countermeasures against anti-emulation are becoming increasingly important detection. Analysis based on real devices can alleviate problems as well improve effectiveness dynamic analysis. Hence, paper we present an investigation machine learning using devices. A tool is implemented automatically extract features phones through several experiments, comparative emulator vs. device means algorithms undertaken. Our study shows that could be extracted more effectively on-device compared emulators. It was also found approximately 24% apps were successfully analysed phone. Furthermore, all studied performed better when applied

参考文章(19)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Suleiman Y. Yerima, Sakir Sezer, Igor Muttik, Android malware detection: An eigenspace analysis approach science and information conference. pp. 1236- 1242 ,(2015) , 10.1109/SAI.2015.7237302
Martina Lindorfer, Matthias Neugschwandtner, Christian Platzer, None, MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis computer software and applications conference. ,vol. 2, pp. 422- 433 ,(2015) , 10.1109/COMPSAC.2015.103
Yousra Aafer, Wenliang Du, Heng Yin, DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 86- 103 ,(2013) , 10.1007/978-3-319-04283-1_6
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Suleiman Y. Yerima, Igor Muttik, Sakir Sezer, High Accuracy Android Malware Detection Using Ensemble Learning Iet Information Security. ,vol. 9, pp. 313- 320 ,(2015) , 10.1049/IET-IFS.2014.0099
Timothy Vidas, Nicolas Christin, Evading android runtime analysis via sandbox detection computer and communications security. pp. 447- 458 ,(2014) , 10.1145/2590296.2590325
Wen-Chieh Wu, Shih-Hao Hung, DroidDolphin: a dynamic Android malware detection framework using big data and machine learning research in adaptive and convergent systems. pp. 247- 252 ,(2014) , 10.1145/2663761.2664223