Detection of Evasive Android Malware Using EigenGCN

被引:1
|
作者
John, Teenu S. [1 ]
Thomas, Tony [2 ]
Emmanuel, Sabu [3 ]
机构
[1] Cochin Univ Sci & Technol, Res Ctr, Indian Inst Informat Technol & Management Kerala, Kazhakkoottam, India
[2] Kerala Univ Digital Sci Innovat & Technol, Trivandrum, India
[3] Singapore Inst Technol, 10 Dover Dr, Singapore 138683, Singapore
关键词
Android malware; Mimicry attacks; Graph convolutional networks; Adversarial malware; System calls; DETECTION SYSTEM;
D O I
10.1016/j.jisa.2024.103880
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently there is an upsurge in Android malware that use obfuscation and repackaging techniques for evasion. Malware may also combine both these techniques to create stealthy adversarial mimicry samples to launch mimicry attacks. In mimicry attacks, the adversary makes sure that the static and dynamic features present in the crafted malware mimics the features present in the legitimate applications. In such cases, the existing detection mechanisms may become less effective. We found that the malicious nature of Android applications can be determined by identifying certain subgraphs that appear in their system call graphs. These subgraphs can be determined with the help of spectral clustering mechanism present in EigenGCN. With this, the system call graph G will be partitioned into two subgraphs G(1) and G(2), in which the malicious functionality if any will be present in the subgraph G(1). The graph Fourier transform based pooling technique in EigenGCN then computes the features of the subgraphs in the form of graph signals. This graph signals serve as a robust signature to detect malware. The proposed mechanism gave an accuracy of 98.7% on common malware, 97.3% on obfuscated malware, 97.8% on repackaged malware, and 90% on adversarial mimicry malware datasets. As far as we know, this is the first work that proposes a malware detection mechanism, that can detect common as well as obfuscated, repackaged, and mimicry malware in Android.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Ares: Triggering Payload of Evasive Android Malware
    Bello, Luciano
    Pistoia, Marco
    2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT), 2018, : 2 - 12
  • [2] Evasive Malware Detection Using Groups of Processes
    Hajmasan, Gheorghe
    Mondoc, Alexandra
    Portase, Radu
    Cret, Octavian
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, SEC 2017, 2017, 502 : 32 - 45
  • [3] Unmasking the Veiled: A Comprehensive Analysis of Android Evasive Malware
    Ruggia, Antonio
    Nisi, Dario
    Dambra, Savino
    Merlo, Alessio
    Balzarotti, Davide
    Aonzo, Simone
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 383 - 398
  • [4] Android Malware Detection Using BERT
    Souani, Badr
    Khanfir, Ahmed
    Bartel, Alexandre
    Allix, Kevin
    Le Traon, Yves
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 575 - 591
  • [5] Android Malware Detection Using Deep Learning
    Elayan, Omar N.
    Mustafa, Ahmad M.
    12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 847 - 852
  • [6] Using Dalvik Opcodes for Malware Detection on Android
    Gaviria de la Puerta, Jose
    Sanz, Borja
    Santos, Igor
    Garcia Bringas, Pablo
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS (HAIS 2015), 2015, 9121 : 416 - 426
  • [7] Detecting Android Malware Using Clone Detection
    Jian Chen
    Manar H. Alalfi
    Thomas R. Dean
    Ying Zou
    Journal of Computer Science and Technology, 2015, 30 : 942 - 956
  • [8] Detecting Android Malware Using Clone Detection
    Chen, Jian
    Alalfi, Manar H.
    Dean, Thomas R.
    Zou, Ying
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015, 30 (05) : 942 - 956
  • [9] Android Malware Detection Using Permission Analysis
    Shahriar, Hossain
    Islam, Mahbubul
    Clincy, Victor
    SOUTHEASTCON 2017, 2017,
  • [10] Using Dalvik opcodes for malware detection on android
    Gaviria de la Puerta, Jose
    Sanz, Borja
    LOGIC JOURNAL OF THE IGPL, 2017, 25 (06) : 938 - 948