Towards Behavior-Based Analysis of Android Obfuscated Malware

被引:0
|
作者
Sawadogo, Zakaria [1 ,2 ,3 ]
Khan, Muhammad Taimoor [2 ]
Loukas, George [2 ]
Dembele, Jean-Marie [1 ]
Sakellari, Georgia [2 ]
Mendy, Gervais [3 ]
机构
[1] Gaston Berger Univ, St Louis, Senegal
[2] Univ Greenwich, Ctr Sustainable Cyber Secur, London, England
[3] Cheikh Anta Diop Univ, Dakar, Senegal
关键词
Android malware; Formal model; Machine learning;
D O I
10.1007/978-3-031-66326-0_10
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we report on the initial results of an ongoing project that aims to rigorously detect obfuscated Android malware. In fact, the detection of Android malware has become increasingly complex as malicious app developers employ various obfuscation techniques. Previous approaches have focused on addressing specific obfuscation methods, but the dynamic nature of these techniques presents challenges in accounting for all possible variations. In response to this challenge, we have developed an innovative behavioral methodology for analyzing obfuscated malware. Our approach combines model-based and AI-based techniques, making it the first effort to integrate these approaches for obfuscated malware detection. Given that deobfuscation is a computationally very challenging (i.e., NP-hard) problem, our methodology circumvents obfuscation by indirectly observing malware behavior through the runtime behavior of target services controlled and operated by the Android applications.
引用
收藏
页码:151 / 165
页数:15
相关论文
共 50 条
  • [41] Detecting Metamorphic Malware by Using Behavior-based Aggregated Signature
    Qu, Yanzhen
    Hughes, Kelly
    2013 WORLD CONGRESS ON INTERNET SECURITY (WORLDCIS), 2013, : 13 - 18
  • [42] An Advanced Ensemble Framework for defending against obfuscated Windows, Android, and IoT malware
    Vasan, Danish
    Akram, Junaid
    Hammoudeh, Mohammad
    Ahmed, Adel F.
    APPLIED SOFT COMPUTING, 2025, 173
  • [43] An Efficient Common Substrings Algorithm for On-the-Fly Behavior-Based Malware Detection and Analysis
    Acosta, Jaime C.
    Mendoza, Humberto
    Medina, Brenda G.
    2012 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2012), 2012,
  • [44] Generating Behavior-based Malware Detection Models with Genetic Programming
    Wuechner, Tobias
    Ochoa, Martin
    Lovat, Enrico
    Pretschner, Alexander
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [45] pBMDS: A Behavior-based Malware Detection System for Cellphone Devices
    Xie, Liang
    Zhang, Xinwen
    Seifert, Jean-Pierre
    Zhu, Sencun
    WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 37 - 48
  • [46] Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN
    Dhanya, K. A. K.
    Vinod, P.
    Yerima, Suleiman Y. Y.
    Bashar, Abul
    David, Anwin
    Abhiram, T.
    Antony, Alan
    Shavanas, Ashil K.
    Kumar, T. Gireesh
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2756 - 2766
  • [47] Runtime-based Behavior Dynamic Analysis System for Android Malware Detection
    Min, Luoxu
    Cao, Qinghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 233 - 236
  • [48] Intelligent Mobile Malware Detection via Behavior-based Features
    Liu, Yihong
    Huang, Xiaokun
    INTERNATIONAL CONFERENCE ON ELECTRICAL AND CONTROL ENGINEERING (ICECE 2015), 2015, : 402 - 407
  • [49] DroidScribe: Classifying Android Malware Based on Runtime Behavior
    Dash, Santanu Kumar
    Suarez-Tangil, Guillermo
    Khan, Salahuddin
    Tam, Kimberly
    Ahmadi, Mansour
    Kinder, Johannes
    Cavallaro, Lorenzo
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 252 - 261
  • [50] Malware Detection in Android based on Dynamic Analysis
    Bhatia, Taniya
    Kaushal, Rishabh
    2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2017,