Skip to main content
Log in

Using G Features to Improve the Efficiency of Function Call Graph Based Android Malware Detection

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In this paper, we proposed a G features based Android malware detecting scheme with information of Function Call Graph. The experimental results showed that our G features based detecting scheme obtained a high detecting performance in up-to-date malware testing dataset. Besides, the collapsing issue induced by the high-dimension vectors of traditional Function Call Graph detection can also be avoided with our methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

References

  1. https://www.magzter.com/news/488/1242/052017/0jt0j. Accessed 2017.

  2. Chan, P. P., & Song, W. K. (2014). Static detection of Android malware by using permissions and API calls. In Machine learning and cybernetics (ICMLC), 2014 IEEE international conference on (pp. 82–87).

  3. Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011). Crowdroid: Behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices (pp. 15–26).

  4. Ham, Y. J., Moon, D., Lee, H. W., Lim, J. D., & Kim, J. N. (2014). Android mobile application system call event pattern analysis for determination of malicious attack. International Journal of Security and Its Applications, 8(1), 231–246.

    Article  Google Scholar 

  5. Zou, S., Zhang, J., & Lin, X. (2015). An effective behavior-based Android malware detection system. Security and Communication Networks, 8(12), 2079–2089.

    Article  Google Scholar 

  6. Faruki, P., Bharmal, A., & Laxmi, V. (2015). Android security: A survey of issues, malware penetration, and defenses. IEEE Communications Surveys & Tutorials, 17(2), 998–1022.

    Article  Google Scholar 

  7. Rahman, M., Rahman, M., & Carbunar, B. (2017). Search rank fraud and malware detection in Google Play. IEEE Transactions on Knowledge and Data Engineering, 29(6), 1329–1342.

    Article  Google Scholar 

  8. Di Cerbo, F., Girardello, A., Michahelles, F., & Voronkova, S. (2014). Detection of malicious applications on android os. In Computational forensics (Vol. 1, pp. 138–149). Berlin: Springer.

  9. Ping, X., Xiaofeng, W., Wenjia, N., Tianqing, Z., & Gang, L. (2014). Android malware detection with contrasting permission patterns. Communications China, 11(8), 1–14.

    Google Scholar 

  10. Abdulla, S., & Altaher, A. (2015). Intelligent approach for android malware detection. KSII Transactions on Internet and Information Systems, 9(8), 2964–2983.

    Article  Google Scholar 

  11. Liu, Y., Zhang, Y., Li, H., & Chen, X. (2016). A hybrid malware detecting scheme for mobile Android applications. In IEEE international conference on consumer electronics, Las Vegas, NV, USA (pp. 155–156).

  12. Wei, T. E., Lee, H. M., Tyan, H. R., Liao, H. Y. M., Jeng, A. B., & Wang, J. C. (2015). DroidExec: Root exploit malware recognition against wide variability via folding redundant function-relation graph. In Advanced communication technology, 17th international conference on (pp. 161–169). IEEE.

  13. Gascon, H., Yamaguchi, F., Arp, D., & Rieck, K. (2013). Structural detection of android malware using embedded call graphs. In Proceedings of the ACM workshop on artificial intelligence and security (pp. 45–54)

  14. Narayanan, A., Chandramohan, M., Chen, L., & Liu, Y. (2017). Context-aware, adaptive, and scalable android malware detection through online learning. IEEE Transactions on Emerging Topics in Computational Intelligence, 1(3), 157–175.

    Article  Google Scholar 

  15. https://en.wikipedia.org/wiki/Dalvik. Accessed 2016.

  16. https://code.google.com/archive/p/androguard/. Accessed 2015.

  17. Haussler, D. (1999). Convolution kernels on discrete structures, Technical report. Department of Computer Science, University of California at Santa Cruz.

  18. Jain, A. K. (2010). Data clustering: 50 years beyond K-means. Pattern Recognition Letters, 31(8), 651–666.

    Article  Google Scholar 

  19. Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In IEEE symposium on security and privacy (pp. 95–109).

  20. Jiang, X. (2012). An evaluation of the application (“App”) verification service in Android 4.2, December. http://www.malgenomeproject.org/. Accessed 2017.

  21. https://virusshare.com/. Accessed 2017.

  22. https://www.wandoujia.com/. Accessed 2017.

  23. https://pan.baidu.com/s/1pKXSX9x. Accessed 2017.

  24. https://en.wikipedia.org/wiki/Sensitivity_and_specificity. Accessed 2016.

Download references

Acknowledgements

National Natural Science Foundation of China (Grant Nos. 61373102, 61771338).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiangdong Huang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Y., Zhang, L. & Huang, X. Using G Features to Improve the Efficiency of Function Call Graph Based Android Malware Detection. Wireless Pers Commun 103, 2947–2955 (2018). https://doi.org/10.1007/s11277-018-5982-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-5982-0

Keywords

Navigation