Enhancing android malware detection explainability through function call graph APIs

被引:1
|
作者
Soi, Diego [1 ]
Sanna, Alessandro [1 ]
Maiorca, Davide [1 ]
Giacinto, Giorgio [1 ]
机构
[1] Univ Cagliari, Dept Elect & Elect Engn, Piazza Armi, I-09123 Cagliari, Italy
关键词
Malware analysis; Deep learning; Explainability; Android;
D O I
10.1016/j.jisa.2023.103691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, mobile devices are massively used in everyday activities. Thus, they contain sensitive data targeted by threat actors like bank accounts and personal information. Through the years, Machine Learning approaches have been proposed to identify malicious Android applications, but recent research highlights the need for better explanations for model decisions, as existing ones may not be related to the app's malicious functionalities. This paper proposes an explainable approach based on static analysis to detect Android malware. The novelty lies in the specific analysis conducted to select and extract the features (i.e., APIs taken from the DEX Call Graph) that immediately provide meaningful explanations of the model functionality, thus allowing a significant correlation of the malware behavior with its family. Moreover, since we contain the number and type of features, the distinct impacts of each one appear more evident. The attained results show that it is possible to reach comparable results (in terms of accuracy) to existing state-of-the-art models while providing easy -to -understand explanations, which may yield significant insights into the malicious functionalities of the samples.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Android Malware Detection via Graph Representation Learning
    Feng, Pengbin
    Ma, Jianfeng
    Li, Teng
    Ma, Xindi
    Xi, Ning
    Lu, Di
    [J]. MOBILE INFORMATION SYSTEMS, 2021, 2021
  • [22] Opcode-level function call graph based android malware classification using deep learning
    Niu, Weina
    Cao, Rong
    Zhang, Xiaosong
    Ding, Kangyi
    Zhang, Kaimeng
    Li, Ting
    [J]. Sensors (Switzerland), 2020, 20 (13): : 1 - 23
  • [23] OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning
    Niu, Weina
    Cao, Rong
    Zhang, Xiaosong
    Ding, Kangyi
    Zhang, Kaimeng
    Li, Ting
    [J]. SENSORS, 2020, 20 (13) : 1 - 23
  • [24] Android malware detection via an app similarity graph
    Frenklach, Tatiana
    Cohen, Dvir
    Shabtai, Asaf
    Puzis, Rami
    [J]. COMPUTERS & SECURITY, 2021, 109
  • [25] Android Gaming Malware Detection Using System Call Analysis
    Jaiswal, Mayank
    Malik, Yasir
    Jaafar, Fehmi
    [J]. 2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 251 - 255
  • [26] Android malware detection based on system call sequences and LSTM
    Xiao, Xi
    Zhang, Shaofeng
    Mercaldo, Francesco
    Hu, Guangwu
    Sangaiah, Arun Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (04) : 3979 - 3999
  • [27] Android malware detection based on system call sequences and LSTM
    Xi Xiao
    Shaofeng Zhang
    Francesco Mercaldo
    Guangwu Hu
    Arun Kumar Sangaiah
    [J]. Multimedia Tools and Applications, 2019, 78 : 3979 - 3999
  • [28] ANDROID MALWARE DETECTION THROUGH PERMISSION AND PACKAGE
    Ju, Xiang-Yu
    [J]. 2014 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2014, : 61 - 65
  • [29] Embedding vector generation based on function call graph for effective malware detection and classification
    Xiao-Wang Wu
    Yan Wang
    Yong Fang
    Peng Jia
    [J]. Neural Computing and Applications, 2022, 34 : 8643 - 8656
  • [30] Hash-Based Function Call Graph Fusion Method for IoT Malware Detection
    Lin, Gao-Yu
    Lin, Ming-Huang
    Hong, Bing-Kai
    Cheng, Shin-Ming
    [J]. 2023 26TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, WPMC, 2023, : 159 - 164