Skip to main content
Log in

An android malware dynamic detection method based on service call co-occurrence matrices

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

With the market share of Android mobile devices increasing, Android has come to dominate the smartphone operating system market. It also draws the attention of malware authors and researchers. The number of Android malicious applications is constantly increasing. However, due to the limitations of static detection in code obfuscation and dynamic loading, the current research of Android malicious code detection needs to be deeply studied in dynamic detection. In this paper, a new Android malware identification method is proposed. This method extracts the feature of Android system service call sequences by using a co-occurrence matrix and uses machine-learning algorithm to classify the feature sequence and to verify whether this feature sequence can expose Android malware behaviors or not. By using 750 malware samples and 1000 benign samples, this paper has designed an experiment to evaluate this method. The results show that this method has a high detection precision rate (97.1%) in the best case and a low false-positive rate (2.1%) in the worst case based on the system service call co-occurrence matrix.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. (2016) 360: China mobile security status report 2015. http://zt.360.cn/1101061855.php?dtid=1101061451&did=1101593997

  2. Afonso VM, de Amorim MF, Grégio ARA, Junquera GB, de Geus PL (2015) Identifying android malware using dynamically obtained features. Journal of Computer Virology and Hacking Techniques 11(1):9–17

  3. Althebyan Q, Yaseen Q, Jararweh Y, Al-Ayyoub M (2016) Cloud support for large scale e-healthcare systems. Ann Telecommun pp 1–13

  4. AndroMalShare: http://andromalshare.androidmalware:8080/#.com

  5. Arzt S, Rasthofer S, Fritz C, Bodden E, Bartel A, Klein J, Le Traon Y, Octeau D, McDaniel P (2014) Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Not 49(6): 259–269

    Article  Google Scholar 

  6. Blokhin K, Saxe J, Mentis D (2013) Malware similarity identification using call graph based system call subsequence features 2013 IEEE 33Rd international conference on distributed computing systems workshops. IEEE, pp 6–10

  7. Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. ACM, pp 15–26

  8. Chen L, Aritsugi M (2006) An svm-based masquerade detection method with online upyear using co-occurrence matrix International conference on detection of intrusions and malware, and vulnerability assessment. Springer, pp 37–53

  9. Coutinho EF, de Carvalho Sousa FR, Rego PAL, Gomes DG, de Souza JN (2015) Elasticity in cloud computing: a survey. Annals of telecommunications-annales des télécommunications 70(7-8):289–309

  10. Cui B, Liu Z, Wang L (2016) Key-aggregate searchable encryption (kase) for group data sharing via cloud storage. IEEE Trans Comput 65(8):2374–2385

    Article  MathSciNet  MATH  Google Scholar 

  11. Enck W, Gilbert P, Han S, Tendulkar V, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2014) Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans Comput Syst (TOCS) 32(2):5

    Article  Google Scholar 

  12. Hruska J (2015) Google throws nearly a billion android users under the bus, refuses to patch os vulnerability. http://www.extremetech.com/mobile/197346-google-throws-nearly-a-billion-android-users-under-the-bus-refuses-/to-patch-os-vulnerability

  13. Lin YD, Lai YC, Chen CH, Tsai HC (2013) Identifying android malicious repackaged applications by thread-grained system call sequences. Comput Secur 39:340–350

    Article  Google Scholar 

  14. Liu Z, Chen X, Yang J, Jia C, You I (2016) New order preserving encryption model for outsourced databases in cloud environments. J Netw Comput Appl 59:198–207

    Article  Google Scholar 

  15. Muñoz EAC, Le Denmat F, Morin A, Lagrange X (2015) Multimedia content delivery trigger in a mobile network to reduce the peak load. Annals of telecommunications-annales des télécommunications 70(7-8):321–330

    Article  Google Scholar 

  16. Oka M, Oyama Y, Abe H, Kato K (2004) Anomaly detection using layered networks based on eigen co-occurrence matrix International workshop on recent advances in intrusion detection. Springer, pp 223–237

  17. Peiravian N, Zhu X (2013) Machine learning for android malware detection using permission and api calls 2013 IEEE 25Th international conference on tools with artificial intelligence. IEEE, pp 300–305

  18. Potharaju R, Newell A, Nita-Rotaru C, Zhang X (2012) Plagiarizing smartphone applications: attack strategies and defense techniques International symposium on engineering secure software and systems. Springer, pp 106–120

  19. Sato R, Chiba D, Goto S (2013) Detecting android malware by analyzing manifest files. Proceedings of the Asia-Pacific Advanced Network 36:23–31

    Article  Google Scholar 

  20. Seo SH, Gupta A, Sallam AM, Bertino E, Yim K (2014) Detecting mobile malware threats to homeland security through static analysis. J Netw Comput Appl 38:43–53

    Article  Google Scholar 

  21. Shabtai A, Fledel Y, Elovici Y (2010) Automated static code analysis for classifying android applications using machine learning 2010 international conference on Computational intelligence and security (CIS). IEEE, pp 329–333

  22. Suarez-Tangil G, Tapiador JE, Peris-Lopez P, Blasco J (2014) Dendroid: a text mining approach to analyzing and classifying code structures in android malware families. Expert Syst Appl 41(4):1104–1117

    Article  Google Scholar 

  23. Vidas T, Votipka D, Christin N (2011) All your droid are belong to us: a survey of current android attacks WOOT, pp 81–90

    Google Scholar 

  24. Wang W, Wang X, Feng D, Liu J, Han Z, Zhang X (2014) Exploring permission-induced risk in android applications for Malicious application detection. IEEE Trans Inf Forensics Secur 9(11):1869–1882

    Article  Google Scholar 

  25. Wang X, Yang Y, Zeng Y (2015) Accurate mobile malware detection and classification in the cloud. SpringerPlus 4(1):1

    Article  Google Scholar 

  26. Weichselbaum L, Neugschwandtner M, Lindorfer M, Fratantonio Y, van der Veen V, Platzer C (2014) Andrubis: Android malware under the magnifying glass. Vienna University of Technology, Tech Rep TRISECLAB-0414 1:5

  27. Wu DJ, Mao CH, Wei TE, Lee HM, Wu KP (2012) Droidmat: Android malware detection through manifest and api calls tracing 2012 seventh asia joint conference on Information security (asia JCIS). IEEE, pp 62–69

  28. Xia Z, Wang X, Zhang L, Qin Z, Sun X, Ren K (2016) A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(11):2594–2608

    Article  Google Scholar 

  29. Xiao X, Xiao X, Jiang Y, Liu X, Ye R (2016) Identifying android malware with system call co-occurrence matrices Transactions on Emerging Telecommunications Technologies

  30. Xu K, Li Y, Deng RH (2016) Iccdetector: Icc-based malware detection on android. IEEE Trans Inf Forensics Secur 11(6):1252–1264

    Article  Google Scholar 

  31. Yuan C, Sun X, Lv R (2016) Fingerprint liveness detection based on multi-scale lpq and pca. China Communications 13(7):60–65

    Article  Google Scholar 

  32. Yuan Z, Lu Y, Wang Z, Xue Y (2014) Droid-sec: Deep learning in android malware detection ACM SIGCOMM Computer communication review, vol 44. ACM, pp 371–372

  33. Zhou Y, Wang Z, Zhou W, Jiang X (2012) Hey, you, get off of my market: Detecting Malicious apps in official and alternative android markets NDSS, vol 25, pp 50–52

Download references

Acknowledgements

The work is supported by the Foundation of Educational Commission of Tianjin, China (Grant No. 20130801), the General Project of Tianjin Municipal Science and Technology Commission (No.15JCYBJC15600), the Major Project of Tianjin Municipal Science and Technology Commission (No.15ZXDSGX00030), NSFC: the United Foundation of General Technology and Fundamental Research (No.U1536122).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chundong Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, C., Li, Z., Mo, X. et al. An android malware dynamic detection method based on service call co-occurrence matrices. Ann. Telecommun. 72, 607–615 (2017). https://doi.org/10.1007/s12243-017-0580-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-017-0580-9

Keywords

Navigation