Detection of Android Malicious Apps Based on the Sensitive Behaviors

被引:12
|
作者
Quan, Daiyong [1 ]
Zhai, Lidong [1 ]
Yang, Fan [1 ]
Wang, Peng [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Android; Sensitive behavior feature vector; Malware detection;
D O I
10.1109/TrustCom.2014.115
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of malicious applications (apps) targeting the Android system has exploded in recent years. The evolution of malware makes it difficult to detect for static analysis tools. Various behavior-based malware detection techniques to mitigate this problem have been proposed. The drawbacks of the existing approaches are: the behavior features extracted from a single source lead to the low detection accuracy and the detection process is too complex. Especially it is unsuitable for smart phones with limited computing power. In this paper, we extract sensitive behavior features from three sources: API calls, native code dynamic execution, and system calls. We propose a sensitive behavior feature vector for representation multi-source behavior features uniformly. Our sensitive behavior representation is able to automatically describe the low-level OS-specific behaviors and high-level application-specific behaviors of an Android malware. Based on the unified behavior feature representation, we provide a light weight decision function to differentiate a given application benign or malicious. We tested the effectiveness of our approach against real malware and the results of our experiments show that its detection accuracy up to 96% with acceptable performance overhead. For a given threshold t (t=9), we can detect the advanced malware family effectively.
引用
收藏
页码:877 / 883
页数:7
相关论文
共 50 条
  • [21] Distributed Detection of Malicious Android Apps While Preserving Privacy Using Federated Learning
    Lee, Suchul
    SENSORS, 2023, 23 (04)
  • [22] Group-wise classification approach to improve android malicious apps detection accuracy
    Sharma, Ashu
    Sahay, Sanjay Kumar
    International Journal of Network Security, 2019, 21 (03) : 409 - 417
  • [23] Detection of malicious behavior in android apps through API calls and permission uses analysis
    Yang, Ming
    Wang, Shan
    Ling, Zhen
    Liu, Yaowen
    Ni, Zhenyu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [24] Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models
    Junaid, Mohsin
    Liu, Donggang
    Kung, David
    COMPUTERS & SECURITY, 2016, 59 : 92 - 117
  • [25] Malicious Android Application Detection Based on Composite Features
    Xiao, Jingxu
    Xu, Kaiyong
    Duan, Jialiang
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,
  • [26] SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
    Huang, Jianjun
    Li, Zhichun
    Xiao, Xusheng
    Wu, Zhenyu
    Lu, Kangjie
    Zhang, Xiangyu
    Jiang, Guofei
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 977 - 992
  • [27] Identifying malicious Android apps using permissions and system events
    Han, Hongmu
    Li, Ruixuan
    Gu, Xiwu
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2016, 8 (01) : 46 - 58
  • [28] Detecting Malicious Android Apps using the Popularity and Relations of APIs
    Jung, Jaemin
    Lim, Kyeonghwan
    Kim, Byoungchul
    Cho, Seong-je
    Han, Sangchul
    Suh, Kyoungwon
    2019 IEEE SECOND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE), 2019, : 309 - 312
  • [29] Characterizing the Use of Code Obfuscation in Malicious and Benign Android Apps
    Kargen, Ulf
    Mauthe, Noah
    Shahmehri, Nahid
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [30] Android decompiler performance on benign and malicious apps: an empirical study
    Kargen, Ulf
    Mauthe, Noah
    Shahmehri, Nahid
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (02)