Introduction
Zhou and Jiang [1] extensively surveyed and analyzed Android malware and found that 86% of the malware collected incorporated repackaged benign applications, and that many of them utilized common advertisement libraries. Such benign code reuse in malware can be expected to cause automated classification and clustering approaches to fail if they base their decisions on features relating to the reused code. To improve detection, classification, and clustering, feature selection from mobile malware must not be naïve, but must instead utilize knowledge of malicious program semantics and structure. We propose an approach for selecting features of mobile malware by using knowledge of malicious program structure to heuristically identify malicious portions of applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhou, Y., Jiang, X.: Dissecting Android malware: Characterization and evolution. In: Proceedings of the 33rd IEEE Symposium on Security and Privacy, Oakland, CA, U.S.A (May 2012)
Brandes, U.: A faster algorithm for betweenness centrality. J. of Mathematical Sociology 25(2), 163–177 (2001)
Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. 9(3), 319–349 (1987)
Karypis, G.: CLUTO – A clustering toolkit. Technical Report TR 02–017, Departnment of Computer Science, U. of Minnesota (November 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Walenstein, A., Deshotels, L., Lakhotia, A. (2012). Program Structure-Based Feature Selection for Android Malware Analysis. In: Schmidt, A.U., Russello, G., Krontiris, I., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 107. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33392-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-642-33392-7_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33391-0
Online ISBN: 978-3-642-33392-7
eBook Packages: Computer ScienceComputer Science (R0)