Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features

被引:30
|
作者
Zhang, Jixin [1 ,2 ]
Qin, Zheng [1 ]
Zhang, Kehuan [2 ]
Yin, Hui [1 ]
Zou, Jingfu [1 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Dalvik opcode graph; global topology features; information theory; similarity searching;
D O I
10.1109/ACCESS.2018.2870534
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Android has become the dominator of smartphone operating system market with a share of 86.8%, the number of Android malicious applications are increasing rapidly as well. Such a large volume of diversified malware variants has forced researchers to investigate new methods by using machine learning since it provides a powerful ability for variants detection. Since the static analysis of malware plays an important role in system security and the opcode has been shown as an effective representation of malware, some of them use the Dalvik opcodes as features of malware and adopt machine learning to detect Android malware. However, current opcode-based methods are also facing some problems, such as considering both of accuracy and time cost, selection of features, and the lack of understanding or description of the characteristics of malware. To overcome the existing challenges, we propose a novel method to build a graph of Dalvik opcode and analyze its global topology properties, which will first construct a weighted probability graph of operations, and then we use information entropy to prune this graph while retaining information as more as possible, the next we extract several global topology features of the graph to represent malware, finally search the similarities with these features between programs. These global topology features formulate the high-level characteristics of malware. Our approach provides a light weight framework to detect Android malware variants based on graph theory and information theory. Theoretical analysis and real-life experimental results show the effectiveness, efficiency, and robustness of our approach, which achieves high detection accuracy and cost little training and detection time.
引用
收藏
页码:51964 / 51974
页数:11
相关论文
共 50 条
  • [1] LTAChecker: Lightweight Android Malware Detection Based on Dalvik Opcode Sequences Using Attention Temporal Networks
    Liu, Huan
    Gong, Liangyi
    Mo, Xiuliang
    Dong, Guozhong
    Yu, Jie
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 25371 - 25381
  • [2] Android malware obfuscation variants detection method based on multi-granularity opcode features
    Tang, Junwei
    Li, Ruixuan
    Jiang, Yu
    Gu, Xiwu
    Li, Yuhua
    Future Generation Computer Systems, 2022, 129 : 141 - 151
  • [3] Android malware obfuscation variants detection method based on multi-granularity opcode features
    Tang, Junwei
    Li, Ruixuan
    Jiang, Yu
    Gu, Xiwu
    Li, Yuhua
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2022, 129 : 141 - 151
  • [4] Detect Android Malware Variants using Component Based Topology Graph
    Shen, Tong
    Zhongyang, Yibing
    Xin, Zhi
    Mao, Bing
    Huang, Hao
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 406 - 413
  • [5] Using Dalvik Opcodes for Malware Detection on Android
    Gaviria de la Puerta, Jose
    Sanz, Borja
    Santos, Igor
    Garcia Bringas, Pablo
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS (HAIS 2015), 2015, 9121 : 416 - 426
  • [6] Using Dalvik opcodes for malware detection on android
    Gaviria de la Puerta, Jose
    Sanz, Borja
    LOGIC JOURNAL OF THE IGPL, 2017, 25 (06) : 938 - 948
  • [7] Graph-Based Malware Detection Using Opcode Sequences
    Gulmez, Sibel
    Sogukpinar, Ibrahim
    9TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS'21), 2021,
  • [8] Android Malware Detection: Looking beyond Dalvik Bytecode
    Sun, Tiezhu
    Daoudi, Nadia
    Allix, Kevin
    Bissyande, Tegawende F.
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021), 2021, : 34 - 39
  • [9] Clustering based opcode graph generation for malware variant detection
    Wai, Fok Kar
    Thing, Vrizlynn L. L.
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [10] Android Malware Detection Based on Structural Features of the Function Call Graph
    Yang, Yang
    Du, Xuehui
    Yang, Zhi
    Liu, Xing
    ELECTRONICS, 2021, 10 (02) : 1 - 18