Demystifying the Evolution of Android Malware Variants

被引:0
|
作者
Tang, Lihong [1 ]
Chen, Xiao [2 ]
Wen, Sheng [1 ]
Li, Li [3 ]
Grobler, Marthie [4 ]
Xiang, Yang [1 ]
机构
[1] Swinburne Univ Technol, Hawthorn, Vic 3122, Australia
[2] Monash Univ, Dept Software Syst & Cybersecur, Clayton, Vic 3800, Australia
[3] Beihang Univ, Sch Software, Beijing 100191, Peoples R China
[4] CSIROs Data61, Clayton, Vic 3168, Australia
关键词
Android; malware; variants; evolution; phylogeny;
D O I
10.1109/TDSC.2023.3325912
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So far, researchers mainly rely on dendrogram or family-tree analysis for malware's evolutionary development. However, our research finds that these techniques cannot support comprehensive malware evolution modelling, which provides a detailed explanation for why Android malware samples evolve in specific ways. This shortcoming is mainly caused by the coarse-grained clustering and analysis of malware samples. For example, because these works do not divide malware samples of a family into variant sets and explore the evolution principles among those sets, they usually fail to capture new variants that have been empowered by the feature 'drifting' in evolution. To address this problem, we propose a fine-grained and in-depth analysis of Android malware. Our experimental work systematically reveals the phylogenetic relationships among the variant sets for a deeper malware evolution analysis. We introduce five metrics: silhouette coefficient, creation date, variant labels, the presentativeness of the variant set formula, and the correctness of the linked edges to evaluate the correctness of our analysis. The results show that our variant clustering achieved a high silhouette value at a small sample distance (0.3), a small standard deviation (three months and 16 days) date based on when the malware samples are lastly modified, a high label consistency (91.4%), a high representativeness (93.1%) of the variant set formula. All the linked variant sets are connected based on our PhyloNet construction rules. We further analyse the coding details of Android malware for each variant set and summarise models of their evolutionary development. In this work, we successfully expose two major models of malware evolution: active evolution and passive evolution. We also disclose four technical explanations on the incentives of the two evolution models (two for each model respectively). These findings are valuable for proactive defence against newly emerged malware samples.
引用
收藏
页码:3324 / 3341
页数:18
相关论文
共 50 条
  • [1] MALRADAR: Demystifying Android Malware in the New Era
    Wang, Liu
    Wang, Haoyu
    He, Ren
    Tao, Ran
    Meng, Guozhu
    Luo, Xiapu
    Liu, Xuanzhe
    PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2022, 6 (02)
  • [2] The Evolution of Android Malware and Android Analysis Techniques
    Tam, Kimberly
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Cavallaro, Lorenzo
    ACM COMPUTING SURVEYS, 2017, 49 (04)
  • [3] Dissecting Android Malware: Characterization and Evolution
    Zhou, Yajin
    Jiang, Xuxian
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 95 - 109
  • [4] AndroSimilar: Robust signature for detecting variants of Android malware
    Faruki, Parvez
    Laxmi, Vijay
    Bharmal, Ammar
    Gaur, M. S.
    Ganmoor, Vijay
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 22 : 66 - 80
  • [5] A study of android malware detection technology evolution
    National Chung-Shan Institute of Science and Technology, Taoyuan, Taiwan
    Proc. Int. Carnahan Conf. Secur. Technol., (135-140):
  • [6] Model Checking for Mobile Android Malware Evolution
    Cimitile, Aniello
    Mercaldo, Francesco
    Martinelli, Fabio
    Nardone, Vittoria
    Santone, Antonella
    Vaglini, Gigliola
    2017 IEEE/ACM 5TH INTERNATIONAL FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING (FORMALISE) PROCEEDINGS, 2017, : 24 - 30
  • [7] The Evolution of Permission as Feature for Android Malware Detection
    Gaviria de la Puerta, Jose
    Sanz, Borja
    Santos Grueiro, Igor
    Garcia Bringas, Pablo
    INTERNATIONAL JOINT CONFERENCE: CISIS'15 AND ICEUTE'15, 2015, 369 : 389 - 400
  • [8] An exploratory study on the evolution of Android malware quality
    Mercaldo, Francesco
    Di Sorbo, Andrea
    Visaggio, Corrado Aaron
    Cimitile, Aniello
    Martinelli, Fabio
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2018, 30 (11)
  • [9] A Study of Android Malware Detection Technology Evolution
    Hsieh Wan-Chen
    Wu Chuan-Chi
    Kao Yung-Wei
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 135 - 140
  • [10] DroidClone: Detecting Android Malware Variants by Exposing Code Clones
    Alam, Shahid
    Riley, Ryan
    Sogukpinar, Ibrahim
    Carkaci, Necmeddin
    2016 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS (DICTAP), 2016, : 79 - 84