ANDRUSPEX : Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices

03/09/2021
by   Yun Shen, et al.
0

Android's security model severely limits the capabilities of anti-malware software. Unlike commodity anti-malware solutions on desktop systems, their Android counterparts run as sandboxed applications without root privileges and are limited by Android's permission system. As such, PHAs on Android are usually willingly installed by victims, as they come disguised as useful applications with hidden malicious functionality, and are encountered on mobile app stores as suggestions based on the apps that a user previously installed. Users with similar interests and app installation history are likely to be exposed and to decide to install the same PHA. This observation gives us the opportunity to develop predictive approaches that can warn the user about which PHAs they will encounter and potentially be tempted to install in the near future. These approaches could then be used to complement commodity anti-malware solutions, which are focused on post-fact detection, closing the window of opportunity that existing solutions suffer from. In this paper we develop Andruspex, a system based on graph representation learning, allowing us to learn latent relationships between user devices and PHAs and leverage them for prediction. We test Andruspex on a real world dataset of PHA installations collected by a security company, and show that our approach achieves very high prediction results (up to 0.994 TPR at 0.0001 FPR), while at the same time outperforming alternative baseline methods. We also demonstrate that Andruspex is robust and its runtime performance is acceptable for a real world deployment.

READ FULL TEXT
research
03/13/2018

Android Inter-App Communication Threats, Solutions, and Challenges

Researchers and commercial companies have made a lot of efforts on detec...
research
01/18/2023

One Size Does not Fit All: Quantifying the Risk of Malicious App Encounters for Different Android User Profiles

Previous work has investigated the particularities of security practices...
research
02/04/2018

IntelliAV: Building an Effective On-Device Android Malware Detector

The importance of employing machine learning for malware detection has b...
research
09/10/2020

You Shall not Repackage! A Journey into the World of Anti-Repackaging on Android

App repackaging refers to the practice of customizing an existing mobile...
research
02/23/2021

SpotCheck: On-Device Anomaly Detection for Android

In recent years the PC has been replaced by mobile devices for many secu...
research
07/07/2021

Android Security using NLP Techniques: A Review

Android is among the most targeted platform by attackers. While attacker...
research
12/16/2020

ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection

App repackaging refers to the practice of customizing an existing mobile...

Please sign up or login with your details

Forgot password? Click here to reset