Enhancing android malware detection explainability through function call graph APIs

被引:1
|
作者
Soi, Diego [1 ]
Sanna, Alessandro [1 ]
Maiorca, Davide [1 ]
Giacinto, Giorgio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, Piazza Armi, I-09123 Cagliari, Italy
关键词
Malware analysis; Deep learning; Explainability; Android;
D O I
10.1016/j.jisa.2023.103691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, mobile devices are massively used in everyday activities. Thus, they contain sensitive data targeted by threat actors like bank accounts and personal information. Through the years, Machine Learning approaches have been proposed to identify malicious Android applications, but recent research highlights the need for better explanations for model decisions, as existing ones may not be related to the app's malicious functionalities. This paper proposes an explainable approach based on static analysis to detect Android malware. The novelty lies in the specific analysis conducted to select and extract the features (i.e., APIs taken from the DEX Call Graph) that immediately provide meaningful explanations of the model functionality, thus allowing a significant correlation of the malware behavior with its family. Moreover, since we contain the number and type of features, the distinct impacts of each one appear more evident. The attained results show that it is possible to reach comparable results (in terms of accuracy) to existing state-of-the-art models while providing easy -to -understand explanations, which may yield significant insights into the malicious functionalities of the samples.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] SFCGDroid: android malware detection based on sensitive function call graph
    Shi, Sibo
    Tian, Shengwei
    Wang, Bo
    Zhou, Tiejun
    Chen, Guanxin
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1115 - 1124
  • [2] SFCGDroid: android malware detection based on sensitive function call graph
    Sibo Shi
    Shengwei Tian
    Bo Wang
    Tiejun Zhou
    Guanxin Chen
    [J]. International Journal of Information Security, 2023, 22 : 1115 - 1124
  • [3] Android Malware Detection Based on Structural Features of the Function Call Graph
    Yang, Yang
    Du, Xuehui
    Yang, Zhi
    Liu, Xing
    [J]. ELECTRONICS, 2021, 10 (02) : 1 - 18
  • [4] SeGDroid: An Android malware detection method based on sensitive function call graph learning
    Liu, Zhen
    Wang, Ruoyu
    Japkowicz, Nathalie
    Gomes, Heitor Murilo
    Peng, Bitao
    Zhang, Wenbin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 235
  • [5] Using G Features to Improve the Efficiency of Function Call Graph Based Android Malware Detection
    Liu, Yu
    Zhang, Liqiang
    Huang, Xiangdong
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 103 (04) : 2947 - 2955
  • [6] Using G Features to Improve the Efficiency of Function Call Graph Based Android Malware Detection
    Yu Liu
    Liqiang Zhang
    Xiangdong Huang
    [J]. Wireless Personal Communications, 2018, 103 : 2947 - 2955
  • [7] AMDroid: Android Malware Detection Using Function Call Graphs
    Ge, Xiuting
    Pan, Ya
    Fang, Chunrong
    Fan, Yong
    [J]. 2019 COMPANION OF THE 19TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS-C 2019), 2019, : 71 - 77
  • [8] Android Malware Detection Method Based on Function Call Graphs
    Ding, Yuxin
    Zhu, Siyi
    Xia, Xiaoling
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2016, PT IV, 2016, 9950 : 70 - 77
  • [9] An Android Malware Detection Approach to Enhance Node Feature Differences in a Function Call Graph Based on GCNs
    Wu, Haojie
    Luktarhan, Nurbol
    Tian, Gaoqi
    Song, Yangyang
    [J]. SENSORS, 2023, 23 (10)
  • [10] Deep learning for effective Android malware detection using API call graph embeddings
    Abdurrahman Pektaş
    Tankut Acarman
    [J]. Soft Computing, 2020, 24 : 1027 - 1043