ABSTRACT
Android System has attracted not only constantly increasing number of smart device users, but also the serious attacks from explosive malicious apps. Consequently, the need to effectively detect Android malware is becoming more and more urgent. In the paper, combing the advantages of static analysis and dynamic analysis, we propose an Android malware detection method based on machine classification. Our experimental results show that the accuracy of the approach meets the requirements of Android malware detection. Subsequently, we apply this approach to perform an interesting detection on the popular apps of different user crowds, and provide some corresponding security advices.
- https://www.kantarworldpanel.com/global/smartphone-os-market-share/Google Scholar
- https://www.freebuf.com/articles/paper/179295.htmlGoogle Scholar
- Priyadarshani M. K. and Sunita V. D. 2015. Two Phase Static Analysis Technique for Android Malware Detection. In Proceedings of the Third International Symposium on Women in Computing and Informatics (WCI '15), Indu Nair (Ed.). ACM, New York, NY, USA, 650--655. DOI=https://doi.org/10.1145/2791405.2791558Google ScholarDigital Library
- Gerardo C., Eric M., and Corrado A. 2015. Detecting Android malware using sequences of system calls. In Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile (DeMobile 2015). ACM, New York, NY, USA, 13--20. DOI=http://dx.doi.org/10.1145/2804345.2804349Google ScholarDigital Library
- https://code.google.com/archive/p/androguard/Google Scholar
- Suzanna S., Yang, and Alfred A. 2015. Android Malware Static Analysis Techniques. In Proceedings of the 10th Annual Cyber and Information Security Research Conference (CISR '15). ACM, New York, NY, USA, Article 5, 8 pages. DOI=https://doi.org/10.1145/2746266.2746271Google ScholarDigital Library
- Huda A. A., Tae O., and Bill S. 2016. Android Malware Detection Using Category-Based Machine Learning Classifiers. In Proceedings of the 17th Annual Conference on Information Technology Education (SIGITE '16). ACM, New York, NY, USA, 54--59. DOI=https://doi.org/10.1145/2978192.2978218Google ScholarDigital Library
- https://code.google.com/archive/p/droidbox/Google Scholar
- Michael S., Felix F., Florian E., and Thomas S. 2013. Mobile-sandbox: having a deeper look into android applications. In Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13). ACM, New York, NY, USA, 1808--1815. DOI=https://doi.org/10.1145/2480362.2480701Google ScholarDigital Library
- Lucky O., Enrico M., and Panagiotis A. 2019. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version). ACM Trans. Priv. Secur. 22, 2, Article 14 (April 2019), 34 pages. DOI=https://doi.org/10.1145/3313391Google ScholarDigital Library
- Mohsen K., Mohammad D., and Ali D. 2018. Application of Machine Learning Algorithms for Android Malware Detection. In Proceedings of the 2018 International Conference on Computational Intelligence and Intelligent Systems (CIIS 2018). ACM, New York, NY, USA, 32--36. DOI=https://doi.org/10.1145/3293475.3293489Google ScholarDigital Library
- Wu W. C. and Hung S. H.. 2014. DroidDolphin: a dynamic Android malware detection framework using big data and machine learning. In Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (RACS '14). ACM, New York, NY, USA, 247--252. DOI=http://dx.doi.org/10.1145/2663761.2664223Google ScholarDigital Library
- Peter Z., Dmitry Z., and Andrew D.. 2017. Detecting Android application malicious behaviors based on the analysis of control flows and data flows. In Proceedings of the 10th International Conference on Security of Information and Networks (SIN '17). ACM, New York, NY, USA, 280--283. DOI= https://doi.org/10.1145/3136825.3140583Google ScholarDigital Library
- Sen C., Minhui X., and Tang Z. S. 2016. StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security (ASIA CCS '16). ACM, New York, NY, USA, 377--388. DOI=https://doi.org/10.1145/2897845.2897860Google ScholarDigital Library
- https://labs.mwrinfosecurity.com/tools/drozer/Google Scholar
- https://www.virustotal.com/Google Scholar
- https://bbs.kafan.cn/forum-31-1.htmlGoogle Scholar
- Dam K. and Tayssir T. 2017. Learning Android Malware. In Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, New York, NY, USA, Article 59, 9 pages. DOI=https://doi.org/10.1145/3098954.3105826Google ScholarDigital Library
- Luke D., Vivek N., and Arun L. 2014. DroidLegacy: Automated Familial Classification of Android Malware. In Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014 (PPREW'14). ACM, New York, NY, USA, Article 3, 12 pages. DOI=http://dx.doi.org/10.1145/2556464.2556467Google ScholarDigital Library
Index Terms
- Android Malware Detection Combined with Static and Dynamic Analysis
Recommendations
On Malware Detection in the Android Operating System
ICACS '20: Proceedings of the 4th International Conference on Algorithms, Computing and SystemsThe threat of malware attacks on Android mobile devices is an ever-growing one, as usage and sophistication increases. As the Android OS is fairly new in the overall set of operating systems, there is much need and room for research in the area of ...
The Evolution of Android Malware and Android Analysis Techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore ...
Dynamic Permissions based Android Malware Detection using Machine Learning Techniques
ISEC '17: Proceedings of the 10th Innovations in Software Engineering ConferenceAndroid is by far the most widely used mobile phone operating system around. However, Android based applications are highly vulnerable to various types of malware attacks attributed to their open nature and high popularity in the market. The fault lies ...
Comments