Detection of Android Malicious Obfuscation Applications Based on Multi-class Features

被引:0
|
作者
Zhao, Meichen [1 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing, Peoples R China
基金
国家重点研发计划;
关键词
Android applications; obfuscation detection; malapp detection; static analysis;
D O I
10.1109/IMCCC.2018.00370
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, obfuscation technology is more and more widely utilized by Android applications (apps). Legitimate app developers employ this technology to protect their intellectual property. However, malicious app (malapp) authors obfuscate their apps to increase the difficulty of reverse-analysis-engineer and to evade signature-based detection. Static analysis method is the main approach to detect malapps. Unfortunately, many static analysis techniques are easily thwarted by obfuscation technology. How to detect obfuscated malapps effectively is thus a big challenge. In this work, we construct a model that detects obfuscated malapps, including obfuscation detection and malapp detection. The module of obfuscation detection extracts the identifier names of classes and methods of apps as features, employing n-gram to generate a fixed-length feature vector for each app. Then it applies Support Vector Machine (SVM) for classifying apps into obfuscation or non-obfuscation. In term of the module of malapp detection, we firstly extract many kinds of features from the APK (Android package) file with static analysis technology, such as Permission, Intent and so on. Then we use SVM to evaluate the performance of this module. Extensive experimental results demonstrate the effectiveness of our methods. The accuracy of obfuscation detection reaches 90.91%, and the F-score arrives at 0.91. Besides, our malapp detection module can exactly detect 97.32% apps.
引用
收藏
页码:1795 / 1799
页数:5
相关论文
共 50 条
  • [11] Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features
    Maestre Vidal, Jorge
    Sotelo Monge, Marco Antonio
    SENSORS, 2020, 20 (07)
  • [12] A detection model of malicious Android applications based on Naive Bayes
    Wang, Chundong
    Zhao, Yi
    Mo, Xiuliang
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (04) : 508 - 515
  • [13] Adalward: a deep-learning framework for multi-class malicious webpage detection
    Shrivastava, Vishal
    Damodaran, Shashank Satish
    Kamble, Megha
    Journal of Cyber Security Technology, 2020, 4 (03) : 153 - 195
  • [14] Android malware detection for timely detection using multi-class deep learning methods
    Anusha, M.
    Karthika, M.
    INTERNATIONAL JOURNAL OF INTELLIGENT ENGINEERING INFORMATICS, 2024, 12 (02) : 213 - 235
  • [15] Multi-class Arrhythmia Detection based on Neural Network with Multi-stage Features Fusion
    Wang, Ruxin
    Yao, Qihang
    Fan, Xiaomao
    Li, Ye
    2019 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), 2019, : 4082 - 4087
  • [16] Visualizing Android Malicious Applications Using Texture Features
    Sharma, Tejpal
    Rattan, Dhavleesh
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2023, 23 (06)
  • [17] On the Efficacy of Static Features to Detect Malicious Applications in Android
    Geneiatakis, Dimitris
    Satta, Riccardo
    Fovino, Igor Nai
    Neisse, Ricardo
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 87 - 98
  • [18] Obfuscation detection in Android applications using deep learning
    Conti, Mauro
    Vinod, P.
    Vitella, Alessio
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [19] Building a Multi-class Prediction App for Malicious URLs
    Sundaram, Vijayaraj
    Abhi, Shinu
    Agarwal, Rashmi
    ADVANCED NETWORK TECHNOLOGIES AND INTELLIGENT COMPUTING, ANTIC 2022, PT II, 2023, 1798 : 455 - 475
  • [20] Learning Coexistence Discriminative Features for Multi-Class Object Detection
    Yao, Chao
    Sun, Pengfei
    Zhi, Ruicong
    Shen, Yanfei
    IEEE ACCESS, 2018, 6 : 37676 - 37684