Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

02/11/2019
by   Hisham Alasmary, et al.
0

The growth in the number of Android and Internet of Things (IoT) devices has witnessed a parallel increase in the number of malicious software (malware), calling for new analysis approaches. We represent binaries using their graph properties of the Control Flow Graph (CFG) structure and conduct an in-depth analysis of malicious graphs extracted from the Android and IoT malware to understand their differences. Using 2,874 and 2,891 malware binaries corresponding to IoT and Android samples, we analyze both general characteristics and graph algorithmic properties. Using the CFG as an abstract structure, we then emphasize various interesting findings, such as the prevalence of unreachable code in Android malware, noted by the multiple components in their CFGs, and larger number of nodes in the Android malware, compared to the IoT malware, highlighting a higher order of complexity. We implement a Machine Learning based classifiers to detect IoT malware from benign ones, and achieved an accuracy of 97.9

READ FULL TEXT

page 1

page 2

research
02/12/2019

Adversarial Samples on Android Malware Detection Systems for IoT Systems

Many IoT(Internet of Things) systems run Android systems or Android-like...
research
08/30/2021

ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation

The rapid growth of the Internet of Things (IoT) devices is paralleled b...
research
08/13/2020

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis

With the rapid growth of Android malware, many machine learning-based ma...
research
07/27/2016

Android Malware Detection Using Parallel Machine Learning Classifiers

Mobile malware has continued to grow at an alarming rate despite on-goin...
research
02/26/2021

IoTMalware: Android IoT Malware Detection based on Deep Neural Network and Blockchain Technology

The Internet of Things (IoT) has been revolutionizing this world by intr...
research
12/27/2018

Malicious Software Detection and Classification utilizing Temporal-Graphs of System-call Group Relations

In this work we propose a graph-based model that, utilizing relations be...
research
04/08/2021

Characterization of Android malware based on opcode analysis

The Android operating system is the most spread mobile platform in the w...

Please sign up or login with your details

Forgot password? Click here to reset