DroidScribe: Classifying Android Malware Based on Runtime Behavior

被引:107
|
作者
Dash, Santanu Kumar [1 ]
Suarez-Tangil, Guillermo [1 ]
Khan, Salahuddin [1 ]
Tam, Kimberly [1 ]
Ahmadi, Mansour [2 ]
Kinder, Johannes [1 ]
Cavallaro, Lorenzo [1 ]
机构
[1] Royal Holloway Univ London, London, England
[2] Univ Cagliari, Cagliari, Italy
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1109/SPW.2016.25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Android ecosystem has witnessed a surge in malware, which not only puts mobile devices at risk but also increases the burden on malware analysts assessing and categorizing threats. In this paper, we show how to use machine learning to automatically classify Android malware samples into families with high accuracy, while observing only their runtime behavior. We focus exclusively on dynamic analysis of runtime behavior to provide a clean point of comparison that is dual to static approaches. Specific challenges in the use of dynamic analysis on Android are the limited information gained from tracking low-level events and the imperfect coverage when testing apps, e.g., due to inactive command and control servers. We observe that on Android, pure system calls do not carry enough semantic content for classification and instead rely on lightweight virtual machine introspection to also reconstruct Android-level inter-process communication. To address the sparsity of data resulting from low coverage, we introduce a novel classification method that fuses Support Vector Machines with Conformal Prediction to generate high-accuracy prediction sets where the information is insufficient to pinpoint a single family.
引用
收藏
页码:252 / 261
页数:10
相关论文
共 50 条
  • [1] MineRBS: Detecting Android Malware Based on Runtime Behavior Sequence
    Jin, Hao
    Li, Yangyang
    Yang, Ying
    [J]. 2020 12TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2020), 2020, : 216 - 222
  • [2] Android Malware Detection Based on Runtime Behaviour
    Aktas, Kursat
    Sen, Sevil
    [J]. 2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [3] Runtime-based Behavior Dynamic Analysis System for Android Malware Detection
    Min, Luoxu
    Cao, Qinghua
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 233 - 236
  • [4] Classifying Android Malware with Dynamic Behavior Dependency Graphs
    Lin, Zimin
    Wang, Rui
    Jia, Xiaoqi
    Zhang, Shengzhi
    Wu, ChuanKun
    [J]. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 378 - 385
  • [5] Detecting and classifying method based on similarity matching of Android malware behavior with profile
    Jang, Jae-Wook
    Yun, Jaesung
    Mohaisen, Aziz
    Woo, Jiyoung
    Kim, Huy Kang
    [J]. SPRINGERPLUS, 2016, 5
  • [6] Runtime Detection Framework for Android Malware
    Kim, TaeGuen
    Kang, BooJoong
    Im, Eul Gyu
    [J]. MOBILE INFORMATION SYSTEMS, 2018, 2018
  • [7] Classifying Android Malware through Subgraph Mining
    Martinelli, Fabio
    Saracino, Andrea
    Sgandurra, Daniele
    [J]. DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 268 - 283
  • [8] Lexical Mining of Malicious URLs for Classifying Android Malware
    Wang, Shanshan
    Yan, Qiben
    Chen, Zhenxiang
    Wang, Lin
    Spolaor, Riccardo
    Yang, Bo
    Conti, Mauro
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 248 - 263
  • [9] An Analysis of Android Malware Behavior
    Singh, Gagandeep
    Jaafar, Fehmi
    Zavarsky, Pavol
    [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 505 - 512
  • [10] On Behavior-based Detection of Malware on Android Platform
    Yu, Wei
    Zhang, Hanlin
    Ge, Linqiang
    Hardy, Rommie
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 814 - 819