Manilyzer: Automated Android Malware Detection through Manifest Analysis

被引:19
|
作者
Feldman, Stephen [1 ]
Stadther, Dillon [2 ]
Wang, Bing [3 ]
机构
[1] Univ Virginia, 1980 Arlington Blvd Apt 1, Charlottesville, VA 22903 USA
[2] Gardner Webb Univ, Boiling Springs, NC 28017 USA
[3] Univ Connecticut, Storrs, CT 06269 USA
关键词
Android security; data mining; malware detection; Manilyzer;
D O I
10.1109/MASS.2014.65
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As the world's most popular mobile operating system, Google's Android OS is the principal target of an ever increasing mobile malware threat. To counter this emerging menace, many malware detection techniques have been proposed. A key aspect of many static detection techniques is their reliance on the permissions requested in the AndroidManifest.xml file. Although these permissions are very important, the manifest also contains additional information that can be valuable in identifying malware, which, however, has not been fully utilized by existing studies. In this paper we present Manilyzer, a system that exploits the rich information in the manifest files, produces feature vectors automatically, and uses state-of-the-art machine learning algorithms to classify applications as malicious or benign. We apply Manilyzer to 617 applications (307 malicious, 310 benign) and find that it is very effective: the accuracy is up to 90%, while the false positives and false negatives are both around 10%. In addition to classifying applications, Manilyzer is used to study the trends of permission requests in malicious applications. Through this evaluation and further analysis, it is clear that malware has evolved over time, and not all malware can be detected through static analysis of manifest files. To address this issue, we briefly explore a dynamic analysis technique that monitors network traffic using a packet sniffer.
引用
收藏
页码:767 / 772
页数:6
相关论文
共 50 条
  • [1] MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID
    Sanz, Borja
    Santos, Igor
    Laorden, Carlos
    Ugarte-Pedrero, Xabier
    Nieves, Javier
    Bringas, Pablo G.
    Alvarez Maranon, Gonzalo
    CYBERNETICS AND SYSTEMS, 2013, 44 (6-7) : 469 - 488
  • [2] DroidMat: Android Malware Detection through Manifest and API Calls Tracing
    Wu, Dong-Jie
    Mao, Ching-Hao
    Wei, Te-En
    Lee, Hahn-Ming
    Wu, Kuo-Ping
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 62 - 69
  • [3] ADAPTING TEXT CATEGORIZATION FOR MANIFEST BASED ANDROID MALWARE DETECTION
    Coban, Onder
    Ozel, Selma Ayse
    COMPUTER SCIENCE-AGH, 2019, 20 (03): : 383 - 405
  • [4] Android malware detection through centrality analysis of applications network
    Mafakheri, Aso
    Sulaimany, Sadegh
    APPLIED SOFT COMPUTING, 2024, 165
  • [5] Automated Android Malware Detection Using User Feedback
    Duque, Joao
    Mendes, Goncalo
    Nunes, Luis
    de Almeida, Ana
    Serrao, Carlos
    SENSORS, 2022, 22 (17)
  • [6] Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution
    Wang, Xiaolei
    Yang, Yuexiang
    Zhu, Sencun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (12) : 2768 - 2782
  • [7] ANDROID MALWARE DETECTION THROUGH PERMISSION AND PACKAGE
    Ju, Xiang-Yu
    2014 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION (ICWAPR), 2014, : 61 - 65
  • [8] Android malware detection through generative adversarial networks
    Amin, Muhammad
    Shah, Babar
    Sharif, Aizaz
    Alit, Tamleek
    Kim, Ki-Il
    Anwar, Sajid
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (02)
  • [9] Detection and Mitigation of Android Malware Through Hybrid Approach
    Patel, Kanubhai
    Buddadev, Bharat
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 455 - 463
  • [10] Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis
    Feng, Yu
    Anand, Saswat
    Dillig, Isil
    Aiken, Alex
    22ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (FSE 2014), 2014, : 576 - 587