Skip to main content

MADS: Malicious Android Applications Detection through String Analysis

  • Conference paper
Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

Abstract

The use of mobile phones has increased in our lives because they offer nearly the same functionality as a personal computer. Besides, the number of applications available for Android-based mobile devices has also experienced a importat grow. Google offers to programmers the opportunity to upload and sell applications in the Android Market, but malware writers upload their malicious code there. In light of this background, we present here Malicious Android applications Detection through String analysis (MADS), a new method that extracts the contained strings from the Android applications to build machine-learning classifiers and detect malware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schultz, M., Eskin, E., Zadok, F., Stolfo, S.: Data mining methods for detection of new malicious executables. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, S&P, pp. 38ā€“49. IEEE (2001)

    Google ScholarĀ 

  2. Santos, I., Devesa, J., Brezo, F., Nieves, J., Bringas, P.G.: OPEM: A static-dynamic approach for machine-learning-based malware detection. In: Herrero, Ɓ., SnĆ”Å”el, V., Abraham, A., Zelinka, I., Baruque, B., QuintiĆ”n, H., Calvo, J.L., Sedano, J., Corchado, E. (eds.) Int. Joint Conf. CISISā€™12-ICEUTEā€™12-SOCOā€™12. AISC, vol.Ā 189, pp. 271ā€“280. Springer, Heidelberg (2013)

    ChapterĀ  Google ScholarĀ 

  3. Santos, I., Nieves, J., Bringas, P.G.: Semi-supervised learning for unknown malware detection. In: Abraham, A., Corchado, J.M., GonzĆ”lez, S.R., De Paz Santana, J.F. (eds.) International Symposium on DCAI. AISC, vol.Ā 91, pp. 415ā€“422. Springer, Heidelberg (2011)

    ChapterĀ  Google ScholarĀ 

  4. Santos, I., Laorden, C., Bringas, P.G.: Collective classification for unknown malware detection. In: Proceedings of the 6th International Conference on Security and Cryptography (SECRYPT), pp. 251ā€“256 (2011)

    Google ScholarĀ 

  5. Santos, I., Brezo, F., Ugarte-Pedrero, X., Bringas, P.G.: Opcode Sequences as Representation of Executables for Data-mining-based Unknown Malware Detection. Information SciencesĀ 231, 64ā€“82 (2013) ISSN: 0020-0255, doi:10.1016/j.ins.2011.08.020

    Google ScholarĀ 

  6. Rieck, K., Holz, T., Willems, C., DĆ¼ssel, P., Laskov, P.: Learning and classification of malware behavior. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.Ā 5137, pp. 108ā€“125. Springer, Heidelberg (2008)

    ChapterĀ  Google ScholarĀ 

  7. Tian, R., Batten, L., Islam, R., Versteeg, S.: An automated classification system based on the strings of trojan and virus families. In: Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE), pp. 23ā€“30 (2009)

    Google ScholarĀ 

  8. Shabtai, A., Fledel, Y., Elovici, Y.: Automated static code analysis for classifying android applications using machine learning. In: Proceedings of the International Conference on Computational Intelligence and Security (CIS), pp. 329ā€“333 (2010)

    Google ScholarĀ 

  9. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15ā€“26. ACM (2011)

    Google ScholarĀ 

  10. Blasing, T., Batyuk, L., Schmidt, A., Camtepe, S., Albayrak, S.: An android application sandbox system for suspicious software detection. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55ā€“62 (2010)

    Google ScholarĀ 

  11. Shabtai, A., Elovici, Y.: Applying behavioral detection on android-based devices. In: Cai, Y., Magedanz, T., Li, M., Xia, J., Giannelli, C. (eds.) Mobilware 2010. LNICST, vol.Ā 48, pp. 235ā€“249. Springer, Heidelberg (2010)

    ChapterĀ  Google ScholarĀ 

  12. Oberheide, J., Miller, J.: Dissecting the android bouncer. In: SUMERCON 2012 (2012), http://jon.oberheide.org/files/summercon12-bouncer.pdf

  13. Santos, I., Penya, Y., Devesa, J., Bringas, P.G.: N-Grams-based file signatures for malware detection. In: Proceedings of the 11th International Conference on Enterprise Information Systems (ICEIS), vol. AIDSS, pp. 317ā€“320 (2009)

    Google ScholarĀ 

  14. Baeza-Yates, R.A., Ribeiro-Neto, B.: Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc, Boston (1999)

    Google ScholarĀ 

  15. Salton, G., McGill, M.: Introduction to modern information retrieval. McGraw-Hill, New York (1983)

    MATHĀ  Google ScholarĀ 

  16. Bishop, C.: Pattern recognition and machine learning. Springer, New York (2006)

    MATHĀ  Google ScholarĀ 

  17. Kotsiantis, S., Zaharakis, I., Pintelas, P.: Supervised machine learning: A review of classification techniques. Frontiers in Artificial Intelligence and ApplicationsĀ 160, 3 (2007)

    Google ScholarĀ 

  18. Kotsiantis, S., Pintelas, P.: Recent advances in clustering: A brief survey. WSEAS Transactions on Information Science and ApplicationsĀ 1(1), 73ā€“81 (2004)

    Google ScholarĀ 

  19. Chapelle, O., Schƶlkopf, B., Zien, A.: Semi-supervised learning. MIT Press (2006)

    Google ScholarĀ 

  20. Pearl, J.: Reverend bayes on inference engines: a distributed hierarchical approach. In: Proceedings of the National Conference on Artificial Intelligence, pp. 133ā€“136 (1982)

    Google ScholarĀ 

  21. Castillo, E., GutiƩrrez, J.M., Hadi, A.S.: Expert Systems and Probabilistic Network Models, Erste edn., New York, NY, USA (1996)

    Google ScholarĀ 

  22. Quinlan, J.: Induction of decision trees. Machine LearningĀ 1(1), 81ā€“106 (1986)

    Google ScholarĀ 

  23. Breiman, L.: Random forests. Machine LearningĀ 45(1), 5ā€“32 (2001)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  24. Garner, S.: Weka: The Waikato environment for knowledge analysis. In: Proceedings of the 1995 New Zealand Computer Science Research Students Conference, pp. 57ā€“64 (1995)

    Google ScholarĀ 

  25. Quinlan, J.: C4.5 programs for machine learning. Morgan Kaufmann Publishers (1993)

    Google ScholarĀ 

  26. Fix, E., Hodges, J.L.: Discriminatory analysis: Nonparametric discrimination: Small sample performance. Technical Report Project 21-49-004, Report Number 11 (1952)

    Google ScholarĀ 

  27. Vapnik, V.: The nature of statistical learning theory. Springer (2000)

    Google ScholarĀ 

  28. Amari, S., Wu, S.: Improving support vector machine classifiers by modifying kernel functions. Neural NetworksĀ 12(6), 783ā€“789 (1999)

    ArticleĀ  Google ScholarĀ 

  29. Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: International Joint Conference on Artificial Intelligence, vol.Ā 14, pp. 1137ā€“1145. Lawrence Erlbaum Associates Ltd. (1995)

    Google ScholarĀ 

  30. Devijver, P., Kittler, J.: Pattern recognition: A statistical approach. Prentice/Hall International (1982)

    Google ScholarĀ 

  31. Singh, Y., Kaur, A., Malhotra, R.: Comparative analysis of regression and machine learning methods for predicting fault proneness models. International Journal of Computer Applications in TechnologyĀ 35(2), 183ā€“193 (2009)

    ArticleĀ  Google ScholarĀ 

  32. Elkan, C.: The foundations of cost-sensitive learning. In: Proceedings of the 2001 International Joint Conference on Artificial Intelligence, pp. 973ā€“978 (2001)

    Google ScholarĀ 

  33. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 1ā€“30 (2012)

    Google ScholarĀ 

  34. Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Using probabilistic generative models for ranking risks of android apps. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 241ā€“252. ACM (2012)

    Google ScholarĀ 

  35. Cano, J., Herrera, F., Lozano, M.: On the combination of evolutionary algorithms and stratified strategies for training set selection in data mining. Applied Soft Computing JournalĀ 6(3), 323ā€“332 (2006)

    ArticleĀ  Google ScholarĀ 

  36. Czarnowski, I., Jedrzejowicz, P.: Instance reduction approach to machine learning and multi-database mining. In: Proceedings of the 2006 Scientific Session Organized during XXI Fall Meeting of the Polish Information Processing Society, Informatica, ANNALES Universitatis Mariae Curie-Skłodowska, Lublin, pp. 60ā€“71 (2006)

    Google ScholarĀ 

  37. Pyle, D.: Data preparation for data mining. Morgan Kaufmann (1999)

    Google ScholarĀ 

  38. Tsang, E., Yeung, D., Wang, X.: OFFSS: optimal fuzzy-valued feature subset selection. IEEE Transactions on Fuzzy SystemsĀ 11(2), 202ā€“213 (2003)

    ArticleĀ  Google ScholarĀ 

  39. Torkkola, K.: Feature extraction by non parametric mutual information maximization. The Journal of Machine Learning ResearchĀ 3, 1415ā€“1438 (2003)

    MathSciNetĀ  MATHĀ  Google ScholarĀ 

  40. Dash, M., Liu, H.: Consistency-based search in feature selection. Artificial IntelligenceĀ 151(1-2), 155ā€“176 (2003)

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  41. Liu, H., Motoda, H.: Instance selection and construction for data mining. Kluwer Academic Pub. (2001)

    Google ScholarĀ 

  42. Liu, H., Motoda, H.: Computational methods of feature selection. Chapman & Hall/CRC (2008)

    Google ScholarĀ 

  43. Blum, A., Langley, P.: Selection of relevant features and examples in machine learning. Artificial IntelligenceĀ 97(1-2), 245ā€“271 (1997)

    ArticleĀ  MathSciNetĀ  MATHĀ  Google ScholarĀ 

  44. Derrac, J., GarcĆ­a, S., Herrera, F.: A First Study on the Use of Coevolutionary Algorithms for Instance and Feature Selection. In: Corchado, E., Wu, X., Oja, E., Herrero, Ɓ., Baruque, B. (eds.) HAIS 2009. LNCS (LNAI), vol.Ā 5572, pp. 557ā€“564. Springer, Heidelberg (2009)

    ChapterĀ  Google ScholarĀ 

  45. Dietterich, T., Lathrop, R., Lozano-PĆ©rez, T.: Solving the multiple instance problem with axis-parallel rectangles. Artificial IntelligenceĀ 89(1-2), 31ā€“71 (1997)

    ArticleĀ  MATHĀ  Google ScholarĀ 

  46. Maron, O., Lozano-PĆ©rez, T.: A framework for multiple-instance learning. In: Advances in Neural Information Processing Systems, pp. 570ā€“576 (1998)

    Google ScholarĀ 

  47. Kang, M., Poosankam, P., Yin, H.: Renovo: A hidden code extractor for packed executables. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, pp. 46ā€“53 (2007)

    Google ScholarĀ 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sanz, B., Santos, I., Nieves, J., Laorden, C., Alonso-Gonzalez, I., Bringas, P.G. (2013). MADS: Malicious Android Applications Detection through String Analysis. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics