Generating sparse explanations for malicious Android opcode sequences using hierarchical LIME

被引:0
|
作者
Mitchell, Jeff [1 ]
McLaughlin, Niall [1 ]
Martinez-del-Rincon, Jesus [1 ]
机构
[1] Queens Univ Belfast, Ctr Secure Informat Technol, Belfast, Antrim, North Ireland
关键词
XAI; Malware detection; Android; Deep learning;
D O I
10.1016/j.cose.2023.103637
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In malware analysis, understanding the reasons behind a decision is important for building trust on the system. In the case of opcode-sequence-based classifiers, when standard explanation methods, such as LIME, are applied, the resulting explanation may not provide much insight into the salient parts of the input sequence. This is because LIME treats each opcode as an independent feature, and perturbing this feature will not cause a significant change in the output, meaning the resulting explanation tends to look like random noise. In this paper, we introduce a novel method Hierarchical-LIME (H-LIME) to address this issue. We take into consideration the hierarchical structure of the program, composed of classes and methods. We show that when H-LIME is applied at the level of classes and methods the resulting explanation is sparser, vastly helping improve its interpretability. We conduct extensive experiments by evaluating our proposed method against criteria for accuracy, completeness, sparsity, stability and efficiency. We show that our method significantly improves on all the evaluation criteria compared to other explainability methods.
引用
收藏
页数:15
相关论文
共 5 条
  • [1] Using Opcode-Sequences to Detect Malicious Android Applications
    Jerome, Quentin
    Allix, Kevin
    State, Radu
    Engel, Thomas
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 914 - 919
  • [2] Identification of malicious android app using manifest and opcode features
    Varsha M.V.
    Vinod P.
    Dhanya K.A.
    [J]. Journal of Computer Virology and Hacking Techniques, 2017, 13 (2) : 125 - 138
  • [3] Dynamic detection on android malicious codes using API call sequences
    Shi, Dong-Xian
    Xu, Zhi-Wei
    Jiang, Jie
    Zhang, Hui
    Pan, Yong-Tao
    [J]. Boletin Tecnico/Technical Bulletin, 2017, 55 (12): : 436 - 446
  • [4] Deep Neural Network Based on Android Mobile Malware Detection System Using Opcode Sequences
    Zhao, Lichao
    Li, Dan
    Zheng, Guangcong
    Shi, Wenbo
    [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 1141 - 1147
  • [5] LTAChecker: Lightweight Android Malware Detection Based on Dalvik Opcode Sequences Using Attention Temporal Networks
    Liu, Huan
    Gong, Liangyi
    Mo, Xiuliang
    Dong, Guozhong
    Yu, Jie
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 25371 - 25381