Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features

被引:30
|
作者
Zhang, Jixin [1 ,2 ]
Qin, Zheng [1 ]
Zhang, Kehuan [2 ]
Yin, Hui [1 ]
Zou, Jingfu [1 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Dalvik opcode graph; global topology features; information theory; similarity searching;
D O I
10.1109/ACCESS.2018.2870534
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since Android has become the dominator of smartphone operating system market with a share of 86.8%, the number of Android malicious applications are increasing rapidly as well. Such a large volume of diversified malware variants has forced researchers to investigate new methods by using machine learning since it provides a powerful ability for variants detection. Since the static analysis of malware plays an important role in system security and the opcode has been shown as an effective representation of malware, some of them use the Dalvik opcodes as features of malware and adopt machine learning to detect Android malware. However, current opcode-based methods are also facing some problems, such as considering both of accuracy and time cost, selection of features, and the lack of understanding or description of the characteristics of malware. To overcome the existing challenges, we propose a novel method to build a graph of Dalvik opcode and analyze its global topology properties, which will first construct a weighted probability graph of operations, and then we use information entropy to prune this graph while retaining information as more as possible, the next we extract several global topology features of the graph to represent malware, finally search the similarities with these features between programs. These global topology features formulate the high-level characteristics of malware. Our approach provides a light weight framework to detect Android malware variants based on graph theory and information theory. Theoretical analysis and real-life experimental results show the effectiveness, efficiency, and robustness of our approach, which achieves high detection accuracy and cost little training and detection time.
引用
收藏
页码:51964 / 51974
页数:11
相关论文
共 50 条
  • [21] Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware
    Canfora, Gerardo
    De Lorenzo, Andrea
    Medvet, Eric
    Mercaldo, Francesco
    Visaggio, Corrado Aaron
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 333 - 340
  • [22] Malware Detection Based On Opcode Frequency
    Yewale, Abhijit
    Singh, Maninder
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 646 - 649
  • [23] Malware Variants Detection Based on Opcode Image Recognition in Small Training Set
    Wang, Tingting
    Xu, Ning
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 328 - 332
  • [24] Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks
    Xu, Qingling
    Zhao, Dawei
    Yang, Shumian
    Xu, Lijuan
    Li, Xin
    ELECTRONICS, 2023, 12 (23)
  • [25] Opcode n-gram based Malware Classification in Android
    Sihag, Vikas
    Mitharwal, Anita
    Vardhan, Manu
    Singh, Pradeep
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 645 - 650
  • [26] Malware Detection Using Markov Blanket Based on Opcode Sequences
    Divandari, Hamid
    Pechaz, Bassir
    Jahan, Majid Vafaie
    SECOND INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK 2015), 2015, : 564 - 569
  • [27] Android Malware Family Classification Based on Sensitive Opcode Sequence
    Jiang, Jianguo
    Li, Song
    Yu, Min
    Li, Gang
    Liu, Chao
    Chen, Kai
    Liu, Hui
    Huang, Weiqing
    2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, : 63 - 69
  • [28] MOSDroid: Obfuscation-resilient android malware detection using multisets of encoded opcode sequences
    Sharma, Yogesh Kumar
    Tomar, Deepak Singh
    Pateriya, R. K.
    Bhandari, Shweta
    COMPUTERS & SECURITY, 2025, 152
  • [29] Android Malware Similarity Clustering using Method based Opcode Sequence and Jaccard Index
    Lee, Shinho
    Jung, Wookhyun
    Kim, Sangwon
    Kim, Eui Tak
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 178 - 183
  • [30] IoT Malware Detection Based on OPCODE Purification
    Gulatas, Ibrahim
    Kilinc, Haci Hakan
    Aydin, Muhammed Ali
    Zaim, Abdul Halim
    ELECTRICA, 2023, 23 (03): : 634 - 642