Optimal Unification of Static and Dynamic Features for Smartphone Security Analysis

被引:0
|
作者
Kumar, Sumit [1 ]
Indu, S. [2 ]
Walia, Gurjit Singh [1 ]
机构
[1] DRDO, Sci Anal Grp, Delhi 110054, India
[2] Delhi Technol Univ, Delhi 110042, India
来源
关键词
Fusion; smartphone; android; security analysis; malware detection; ANDROID MALWARE DETECTION; HYBRID ANALYSIS; FUSION;
D O I
10.32604/iasc.2023.024469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android Smartphones are proliferating extensively in the digital world due to their widespread applications in a myriad of fields. The increased popularity of the android platform entices malware developers to design malicious apps to achieve their malevolent intents. Also, static analysis approaches fail to detect run-time behaviors of malicious apps. To address these issues, an optimal unification of static and dynamic features for smartphone security analysis is proposed. The proposed solution exploits both static and dynamic features for generating a highly distinct unified feature vector using graph based cross-diffusion strategy. Further, a unified feature is subjected to the fuzzy-based classification model to distinguish benign and malicious applications. The suggested framework is extensively experimentally validated through both qualitative and quantitative analysis and results are compared with the existing solutions. Performance evaluation over benchmarked datasets from Google Play Store, Drebin, Androzoo, AMD, and CICMalDroid2020 revealed that the suggested solution outperforms state-of-the-art methods. We achieve average detection accuracy of 98.62% and F1 Score of 0.9916.
引用
收藏
页码:1035 / 1051
页数:17
相关论文
共 50 条
  • [1] Optimal Placement of SVC for Static and Dynamic Voltage Security Enhancement
    Verma, M. K.
    Srivastava, S. C.
    [J]. INTERNATIONAL JOURNAL OF EMERGING ELECTRIC POWER SYSTEMS, 2005, 2 (02):
  • [2] TOWARD THE CONCEPT OF INTEGRATED SECURITY - OPTIMAL DISPATCH UNDER STATIC AND DYNAMIC SECURITY CONSTRAINTS
    CHOWDHURY, BH
    [J]. ELECTRIC POWER SYSTEMS RESEARCH, 1992, 25 (03) : 213 - 225
  • [3] Unification of Static and Dynamic Analyses to Enable Vectorization
    Rane, Ashay
    Krishnaiyer, Rakesh
    Newburn, Chris J.
    Browne, James
    Fialho, Leonardo
    Matveev, Zakhar
    [J]. LANGUAGES AND COMPILERS FOR PARALLEL COMPUTING (LCPC 2014), 2015, 8967 : 367 - 381
  • [4] Static and Dynamic Analysis for Web Security in Generic Format
    Wu, Raymond
    Hisada, Masayuki
    Ranaweera, Rasika
    [J]. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, PROCEEDINGS, 2009, 45 : 233 - +
  • [5] Static and dynamic analysis for web security in industry applications
    Wu, Raymond
    Hisada, Masayuki
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2010, 3 (02) : 138 - 150
  • [6] The Architectural Review of Web Security in Static and Dynamic Analysis
    Wu, Raymond
    Hisada, Masayuki
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08): : 277 - 286
  • [7] Static and dynamic spectral features: Their noise robustness and optimal weights for ASR
    Chen, Y
    Soong, FK
    Lee, T
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 241 - 244
  • [8] Static and dynamic spectral features: Their noise robustness and optimal weights for ASR
    Yang, Chen
    Soong, Frank K.
    Lee, Tan
    [J]. IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2007, 15 (03): : 1087 - 1097
  • [9] Static Mining and Dynamic Taint for Mobile Security Threats Analysis
    Yang, Tianda
    Qian, Kai
    Li, Lei
    Lo, Dan
    Tao, Lixin
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 234 - 240
  • [10] An approach for mapping features to code based on static and dynamic analysis
    Rohatgi, Abhishek
    Hamou-Lhadj, Abdelwahab
    Rilling, Juergen
    [J]. PROCEEDINGS OF THE 16TH IEEE INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION, 2008, : 234 - 239