Demystifying the Evolution of Android Malware Variants

被引:0
|
作者
Tang, Lihong [1 ]
Chen, Xiao [2 ]
Wen, Sheng [1 ]
Li, Li [3 ]
Grobler, Marthie [4 ]
Xiang, Yang [1 ]
机构
[1] Swinburne Univ Technol, Hawthorn, Vic 3122, Australia
[2] Monash Univ, Dept Software Syst & Cybersecur, Clayton, Vic 3800, Australia
[3] Beihang Univ, Sch Software, Beijing 100191, Peoples R China
[4] CSIROs Data61, Clayton, Vic 3168, Australia
关键词
Android; malware; variants; evolution; phylogeny;
D O I
10.1109/TDSC.2023.3325912
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
It is important to understand the evolution of Android malware as this facilitates the development of defence techniques by proactively capturing malware features. So far, researchers mainly rely on dendrogram or family-tree analysis for malware's evolutionary development. However, our research finds that these techniques cannot support comprehensive malware evolution modelling, which provides a detailed explanation for why Android malware samples evolve in specific ways. This shortcoming is mainly caused by the coarse-grained clustering and analysis of malware samples. For example, because these works do not divide malware samples of a family into variant sets and explore the evolution principles among those sets, they usually fail to capture new variants that have been empowered by the feature 'drifting' in evolution. To address this problem, we propose a fine-grained and in-depth analysis of Android malware. Our experimental work systematically reveals the phylogenetic relationships among the variant sets for a deeper malware evolution analysis. We introduce five metrics: silhouette coefficient, creation date, variant labels, the presentativeness of the variant set formula, and the correctness of the linked edges to evaluate the correctness of our analysis. The results show that our variant clustering achieved a high silhouette value at a small sample distance (0.3), a small standard deviation (three months and 16 days) date based on when the malware samples are lastly modified, a high label consistency (91.4%), a high representativeness (93.1%) of the variant set formula. All the linked variant sets are connected based on our PhyloNet construction rules. We further analyse the coding details of Android malware for each variant set and summarise models of their evolutionary development. In this work, we successfully expose two major models of malware evolution: active evolution and passive evolution. We also disclose four technical explanations on the incentives of the two evolution models (two for each model respectively). These findings are valuable for proactive defence against newly emerged malware samples.
引用
收藏
页码:3324 / 3341
页数:18
相关论文
共 50 条
  • [41] Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection
    Guerra-Manzanares, Alejandro
    Bahsi, Hayretdin
    Luckner, Marcin
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 65 - 96
  • [42] Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection
    Alejandro Guerra-Manzanares
    Hayretdin Bahsi
    Marcin Luckner
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 65 - 96
  • [43] Monitoring Real Android Malware
    Kuester, Jan-Christoph
    Bauer, Andreas
    RUNTIME VERIFICATION, RV 2015, 2015, 9333 : 136 - 152
  • [44] A Comparative Analysis of Android Malware
    Chavan, Neeraj
    Di Troia, Fabio
    Stamp, Mark
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 664 - 673
  • [45] Android malware analysis in a nutshell
    Almomani, Iman
    Ahmed, Mohanned
    El-Shafai, Walid
    PLOS ONE, 2022, 17 (07):
  • [46] An Analysis of Android Malware Behavior
    Singh, Gagandeep
    Jaafar, Fehmi
    Zavarsky, Pavol
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 505 - 512
  • [47] Android malware detection model
    Yang H.
    Na Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (03): : 45 - 51
  • [48] Android Fragmentation in Malware Detection
    Long Nguyen-Vu
    Ahn, Jinung
    Jung, Souhwan
    COMPUTERS & SECURITY, 2019, 87
  • [49] Performance of Malware classifier for Android
    Alam, Mohammed S.
    Vuong, Son T.
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,
  • [50] Android malware obfuscation variants detection method based on multi-granularity opcode features
    Tang, Junwei
    Li, Ruixuan
    Jiang, Yu
    Gu, Xiwu
    Li, Yuhua
    Future Generation Computer Systems, 2022, 129 : 141 - 151