DroidMorph: Are We Ready to Stop the Attack of Android Malware Clones?

06/17/2021
by   Shahid Alam, et al.
0

The number of Android malware variants (clones) are on the rise and, to stop this attack of clones we need to develop new methods and techniques for analysing and detecting them. As a first step, we need to study how these malware clones are generated. This will help us better anticipate and recognize these clones. In this paper we present a new tool named DroidMorph, that provides morphing of Android applications (APKs) at different level of abstractions, and can be used to create Android application (malware/benign) clones. As a case study we perform testing and evaluating resilience of current commercial anti-malware products against attack of the Android malware clones generated by DroidMorph. We found that 8 out of 17 leading commercial anti-malware programs were not able to detect any of the morphed APKs. We hope that DroidMorph will be used in future research, to improve Android malware clones analysis and detection, and help stop them.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/04/2023

Review of Deep Learning-based Malware Detection for Android and Windows System

Differentiating malware is important to determine their behaviors and le...
research
02/04/2018

IntelliAV: Building an Effective On-Device Android Malware Detector

The importance of employing machine learning for malware detection has b...
research
09/13/2017

On labeling Android malware signatures using minhashing and further classification with Structural Equation Models

Multi-scanner Antivirus systems provide insightful information on the na...
research
04/08/2021

Characterization of Android malware based on subgraph isomorphism

The Android operating system is the most spread mobile platform in the w...
research
11/04/2022

MalGrid: Visualization Of Binary Features In Large Malware Corpora

The number of malware is constantly on the rise. Though most new malware...
research
03/01/2018

The Shape of Alerts: Detecting Malware Using Distributed Detectors by Robustly Amplifying Transient Correlations

We introduce a new malware detector - Shape-GD - that aggregates per-mac...
research
08/03/2018

Stimulation and Detection of Android Repackaged Malware with Active Learning

Repackaging is a technique that has been increasingly adopted by authors...

Please sign up or login with your details

Forgot password? Click here to reset