Demystifying the Evolution of Android Malware Variants

被引:0
|
作者
Tang, Lihong [1 ]
Chen, Xiao [2 ]
Wen, Sheng [1 ]
Li, Li [3 ]
Grobler, Marthie [4 ]
Xiang, Yang [1 ]
机构
[1] Swinburne Univ Technol, Hawthorn, Vic 3122, Australia
[2] Monash Univ, Dept Software Syst & Cybersecur, Clayton, Vic 3800, Australia
[3] Beihang Univ, Sch Software, Beijing 100191, Peoples R China
[4] CSIROs Data61, Clayton, Vic 3168, Australia
关键词
Android; malware; variants; evolution; phylogeny;
D O I
10.1109/TDSC.2023.3325912
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So far, researchers mainly rely on dendrogram or family-tree analysis for malware's evolutionary development. However, our research finds that these techniques cannot support comprehensive malware evolution modelling, which provides a detailed explanation for why Android malware samples evolve in specific ways. This shortcoming is mainly caused by the coarse-grained clustering and analysis of malware samples. For example, because these works do not divide malware samples of a family into variant sets and explore the evolution principles among those sets, they usually fail to capture new variants that have been empowered by the feature 'drifting' in evolution. To address this problem, we propose a fine-grained and in-depth analysis of Android malware. Our experimental work systematically reveals the phylogenetic relationships among the variant sets for a deeper malware evolution analysis. We introduce five metrics: silhouette coefficient, creation date, variant labels, the presentativeness of the variant set formula, and the correctness of the linked edges to evaluate the correctness of our analysis. The results show that our variant clustering achieved a high silhouette value at a small sample distance (0.3), a small standard deviation (three months and 16 days) date based on when the malware samples are lastly modified, a high label consistency (91.4%), a high representativeness (93.1%) of the variant set formula. All the linked variant sets are connected based on our PhyloNet construction rules. We further analyse the coding details of Android malware for each variant set and summarise models of their evolutionary development. In this work, we successfully expose two major models of malware evolution: active evolution and passive evolution. We also disclose four technical explanations on the incentives of the two evolution models (two for each model respectively). These findings are valuable for proactive defence against newly emerged malware samples.
引用
收藏
页码:3324 / 3341
页数:18
相关论文
共 50 条
  • [31] Smart malware detection on Android
    Gheorghe, Laura
    Marin, Bogdan
    Gibson, Gary
    Mogosanu, Lucian
    Deaconescu, Razvan
    Voiculescu, Valentin-Gabriel
    Carabas, Mihai
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4254 - 4272
  • [32] Infrastructure for Detecting Android Malware
    Delosieres, Laurent
    Garcia, David
    INFORMATION SCIENCES AND SYSTEMS 2013, 2013, 264 : 389 - 398
  • [33] TRENDS IN ANDROID MALWARE DETECTION
    Shaerpour, Kaveh
    Dehghantanha, Ali
    Mahmod, Ramlan
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (03) : 21 - 40
  • [34] Fingerprinting Android malware families
    Xie, Nannan
    Wang, Xing
    Wang, Wei
    Liu, Jiqiang
    FRONTIERS OF COMPUTER SCIENCE, 2019, 13 (03) : 637 - 646
  • [35] Orchestrating Android Malware Experiments
    Lalande, Jean-Francois
    Graux, Pierre
    Miranda, Tomas Concepcion
    2019 IEEE 27TH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2019), 2019, : 433 - 434
  • [36] The analysis of android malware behaviors
    Department of Computer and Information Engineering, Huainan Normal University, Huainan, China
    Int. J. Secur. Appl., 3 (335-346):
  • [37] Framework for malware analysis in Android
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    SISTEMAS & TELEMATICA, 2016, 14 (37): : 45 - 56
  • [38] The Analysis of Android Malware Behaviors
    Fan Yuhui
    Xu Ning
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 335 - 345
  • [39] Features to Detect Android Malware
    Urcuqui Lopez, Christian Camilo
    Delgado Villarreal, Jhoan Steven
    Perez Belalcazar, Andres Felipe
    Navarro Cadavid, Andres
    Diaz Cely, Javier Gustavo
    2018 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2018,
  • [40] Identifying Android Malware Instructions
    Morales Medina, Laura Victoria
    Rueda, Sandra Julieta
    2014 IEEE LATIN-AMERICA CONFERENCE ON COMMUNICATIONS (LATINCOM), 2014,