Automated identification of callbacks in Android framework using machine learning techniques

被引:0
|
作者
Chen X. [1 ,2 ]
Mu R. [3 ]
Yan Y. [3 ]
机构
[1] University of Chinese Academy of Sciences, 19A Yuquan Rd., Shijingshan District, Beijing
[2] Institute of Microelectronics of Chinese Academy of Sciences, Kunshan Branch, 1699 Zuchongzhi, Kunshan
[3] Institute of Microelectronics of Chinese Academy of Sciences, 3 Beitucheng West Road, Chaoyang District, Beijing
关键词
Android; Android framework; Callbacks identification; Cross-validation; Machine learning; Malware; Mobile application security; Privacy; Static analysis; Support vector machine; SVM;
D O I
10.1504/IJES.2018.093688
中图分类号
学科分类号
摘要
The number of malicious Android applications has grown explosively, leaking massive privacy sensitive information. Nevertheless, the existing static code analysis tools relying on imprecise callbacks list will miss high numbers of leaks, which is demonstrated in the paper. This paper presents a machine learning approach to identifying callbacks automatically in Android framework. As long as it is given a training set of hand-annotated callbacks, the proposed approach can detect all of them in the entire framework. A series of experiments are conducted to identify 20,391 callbacks on Android 4.2. This proposed approach, verified by a ten-fold cross-validation, is effective and efficient in terms of precision and recall, with an average of more than 91%. The evaluation results shows that many of newly discovered callbacks are indeed used, which furthermore confirms that the approach is suitable for all Android framework versions. Copyright © 2018 Inderscience Enterprises Ltd.
引用
收藏
页码:301 / 312
页数:11
相关论文
共 50 条
  • [31] A COMPARISON OF MACHINE LEARNING TECHNIQUES FOR ANDROID MALWARE DETECTION USING APACHE SPARK
    Memon, Laraib U.
    Bawany, Narmeen Z.
    Shamsi, Jawwad A.
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (03): : 1572 - 1586
  • [32] The identification and localization of speaker using fusion techniques and machine learning techniques
    Rasha H. Ali
    Mohammed Najm Abdullah
    Buthainah F. Abed
    Evolutionary Intelligence, 2024, 17 : 133 - 149
  • [33] The identification and localization of speaker using fusion techniques and machine learning techniques
    Ali, Rasha H.
    Abdullah, Mohammed Najm
    Abed, Buthainah F.
    EVOLUTIONARY INTELLIGENCE, 2024, 17 (01) : 133 - 149
  • [34] ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms
    Elsersy, Wael F.
    Anuar, Nor Badrul
    Ab Razak, Mohd Faizal
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (02) : 1771 - 1791
  • [35] ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms
    Wael F. Elsersy
    Nor Badrul Anuar
    Mohd Faizal Ab Razak
    Arabian Journal for Science and Engineering, 2023, 48 : 1771 - 1791
  • [36] Automated traffic classification and application identification using machine learning
    Zander, S
    Nguyen, T
    Armitage, G
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 250 - 257
  • [37] DASH Framework Using Machine Learning Techniques and Security Controls
    Shaheed, Aref
    Al-radwan, Haisam
    INTERNATIONAL JOURNAL OF DIGITAL MULTIMEDIA BROADCASTING, 2022, 2022
  • [38] Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review
    Smmarwar, Santosh K.
    Gupta, Govind P.
    Kumar, Sanjay
    TELEMATICS AND INFORMATICS REPORTS, 2024, 14
  • [39] CVR: An Automated CV Recommender System Using Machine Learning Techniques
    Shovon, S. M. Shahriar Ferdous
    Bin Mohsin, Md. Mahir Absar
    Tama, Kanij Tamema Jahan
    Ferdaous, Jannatul
    Momen, Sifat
    DATA SCIENCE AND ALGORITHMS IN SYSTEMS, 2022, VOL 2, 2023, 597 : 312 - 325
  • [40] Automated Analysis of Femoral Artery Calcification Using Machine Learning Techniques
    Zhao, Liang
    Odigwe, Brendan
    Lessner, Susan
    Clair, Daniel G.
    Mussa, Firas
    Valafar, Homayoun
    2019 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2019), 2019, : 584 - 589