Towards Behavior-Based Analysis of Android Obfuscated Malware

被引:0
|
作者
Sawadogo, Zakaria [1 ,2 ,3 ]
Khan, Muhammad Taimoor [2 ]
Loukas, George [2 ]
Dembele, Jean-Marie [1 ]
Sakellari, Georgia [2 ]
Mendy, Gervais [3 ]
机构
[1] Gaston Berger Univ, St Louis, Senegal
[2] Univ Greenwich, Ctr Sustainable Cyber Secur, London, England
[3] Cheikh Anta Diop Univ, Dakar, Senegal
关键词
Android malware; Formal model; Machine learning;
D O I
10.1007/978-3-031-66326-0_10
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we report on the initial results of an ongoing project that aims to rigorously detect obfuscated Android malware. In fact, the detection of Android malware has become increasingly complex as malicious app developers employ various obfuscation techniques. Previous approaches have focused on addressing specific obfuscation methods, but the dynamic nature of these techniques presents challenges in accounting for all possible variations. In response to this challenge, we have developed an innovative behavioral methodology for analyzing obfuscated malware. Our approach combines model-based and AI-based techniques, making it the first effort to integrate these approaches for obfuscated malware detection. Given that deobfuscation is a computationally very challenging (i.e., NP-hard) problem, our methodology circumvents obfuscation by indirectly observing malware behavior through the runtime behavior of target services controlled and operated by the Android applications.
引用
收藏
页码:151 / 165
页数:15
相关论文
共 50 条
  • [21] DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware
    Suarez-Tangil, Guillermo
    Dash, Santanu Kumar
    Ahmadi, Mansour
    Kinder, Johannes
    Giacinto, Giorgio
    Cavallaro, Lorenzo
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 309 - 320
  • [22] The rise of obfuscated Android malware and impacts on detection methods
    Elsersy W.F.
    Feizollah A.
    Anuar N.B.
    PeerJ Computer Science, 2022, 8
  • [23] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [24] Behavior-Based Malware Detection on Mobile Phone
    Dai, Shuaifu
    Liu, Yaxin
    Wang, Tielei
    Wei, Tao
    Zou, Wei
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [25] A Study on The behavior-based Malware Detection Signature
    Oh, Sungtaek
    Go, Woong
    Lee, Taejin
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 663 - 670
  • [26] Author Correction: AndroDex: Android Dex Images of Obfuscated Malware
    Sana Aurangzeb
    Muhammad Aleem
    Muhammad Taimoor Khan
    George Loukas
    Georgia Sakellari
    Scientific Data, 11 (1)
  • [27] Detection Efficiency of Static Analyzers against Obfuscated Android Malware
    Ajiri, Victor
    Butakov, Sergey
    Zavarsky, Pavol
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 231 - 234
  • [28] Android malware detection based on static behavior feature analysis
    Chen C.
    Liu Y.
    Shen B.
    Cheng J.-J.
    Journal of Computers (Taiwan), 2018, 29 (06) : 243 - 253
  • [29] Behavior-based Malware Analysis using Profile Hidden Markov Models
    Ravi, Saradha
    Balakrishnan, N.
    Venkatesh, Bharath
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 195 - 206
  • [30] An Android Malware Detection System Based on Behavior Comparison Analysis
    Tao, Jing
    Zhang, Yan
    Cao, Pengfei
    Wang, Zheng
    Zhao, Qiqi
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 387 - 396