A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization

04/06/2017
by   Annamalai Narayanan, et al.
0

Existing Android malware detection approaches use a variety of features such as security sensitive APIs, system calls, control-flow structures and information flows in conjunction with Machine Learning classifiers to achieve accurate detection. Each of these feature sets provides a unique semantic perspective (or view) of apps' behaviours with inherent strengths and limitations. Meaning, some views are more amenable to detect certain attacks but may not be suitable to characterise several other attacks. Most of the existing malware detection approaches use only one (or a selected few) of the aforementioned feature sets which prevent them from detecting a vast majority of attacks. Addressing this limitation, we propose MKLDroid, a unified framework that systematically integrates multiple views of apps for performing comprehensive malware detection and malicious code localisation. The rationale is that, while a malware app can disguise itself in some views, disguising in every view while maintaining malicious intent will be much harder. MKLDroid uses a graph kernel to capture structural and contextual information from apps' dependency graphs and identify malice code patterns in each view. Subsequently, it employs Multiple Kernel Learning (MKL) to find a weighted combination of the views which yields the best detection accuracy. Besides multi-view learning, MKLDroid's unique and salient trait is its ability to locate fine-grained malice code portions in dependency graphs (e.g., methods/classes). Through our large-scale experiments on several datasets (incl. wild apps), we demonstrate that MKLDroid outperforms three state-of-the-art techniques consistently, in terms of accuracy while maintaining comparable efficiency. In our malicious code localisation experiments on a dataset of repackaged malware, MKLDroid was able to identify all the malice classes with 94

READ FULL TEXT
research
05/22/2019

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

With the number of new mobile malware instances increasing by over 50% a...
research
09/15/2018

apk2vec: Semi-supervised multi-view representation learning for profiling Android applications

Building behavior profiles of Android applications (apps) with holistic,...
research
07/22/2018

A Preliminary Study On the Sustainability of Android Malware Detection

Machine learning-based malware detection dominates current security defe...
research
02/23/2018

An investigation of the classifiers to detect android malicious apps

Android devices are growing exponentially and are connected through the ...
research
06/06/2018

Obfuscation Resilient Search throughExecutable Classification

Android applications are usually obfuscated before release, making it di...
research
06/06/2018

Obfuscation Resilient Search through Executable Classification

Android applications are usually obfuscated before release, making it di...
research
11/20/2022

Mask Off: Analytic-based Malware Detection By Transfer Learning and Model Personalization

The vulnerability of smartphones to cyberattacks has been a severe conce...

Please sign up or login with your details

Forgot password? Click here to reset