Apposcopy: Semantics-Based Detection of Android Malware through Static Analysis

被引:251
|
作者
Feng, Yu [1 ]
Anand, Saswat [2 ]
Dillig, Isil [1 ]
Aiken, Alex [2 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
[2] Stanford Univ, Stanford, CA 94305 USA
关键词
Android; Inter-component Call Graph; Taint Analysis;
D O I
10.1145/2635868.2635869
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We present Apposcopy, a new semantics-based approach for identifying a prevalent class of Android malware that steals private user information. Apposcopy incorporates (i) a high-level language for specifying signatures that describe semantic characteristics of malware families and (ii) a static analysis for deciding if a given application matches a malware signature. The signature matching algorithm of Apposcopy uses a combination of static taint analysis and a new form of program representation called Inter-Component Call Graph to efficiently detect Android applications that have certain control- and data-flow properties. We have evaluated Apposcopy on a corpus of real-world Android applications and show that it can effectively and reliably pinpoint malicious applications that belong to certain malware families.
引用
收藏
页码:576 / 587
页数:12
相关论文
共 50 条
  • [31] What Static Analysis Can Utmost Offer for Android Malware Detection
    Kabakus, Abdullah Talha
    INFORMATION TECHNOLOGY AND CONTROL, 2019, 48 (02): : 235 - 249
  • [32] Comprehensive Android Malware Detection: Leveraging Machine Learning and Sandboxing Techniques through Static and Dynamic Analysis
    Bhooshan, Prashant
    Darshan, Shiva S. L.
    Sonkar, Nidhi
    2024 IEEE 21ST INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SMART SYSTEMS, MASS 2024, 2024, : 580 - 585
  • [33] Android malware detection through centrality analysis of applications network
    Mafakheri, Aso
    Sulaimany, Sadegh
    APPLIED SOFT COMPUTING, 2024, 165
  • [34] Android malware detection based on power consumption analysis
    Yang H.-Y.
    Tang R.-W.
    1600, Univ. of Electronic Science and Technology of China (45): : 981 - 985
  • [35] Manilyzer: Automated Android Malware Detection through Manifest Analysis
    Feldman, Stephen
    Stadther, Dillon
    Wang, Bing
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 767 - 772
  • [36] A novel Android malware detection method with API semantics extraction
    Yang, Hongyu
    Wang, Youwei
    Zhang, Liang
    Cheng, Xiang
    Hu, Ze
    COMPUTERS & SECURITY, 2024, 137
  • [37] Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference
    Ming, Jiang
    Xu, Dongpeng
    Wu, Dinghao
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 416 - 430
  • [38] Android malware detection method based on highly distinguishable static features and DenseNet
    Yang, Jiyun
    Zhang, Zhibo
    Zhang, Heng
    Fan, JiaWen
    PLOS ONE, 2022, 17 (11):
  • [39] Static detection approach for Android malware based on multi-context features
    Liu X.
    Lei Q.
    Du X.
    Liu K.
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 48 (02): : 85 - 90
  • [40] Discovering optimal features using static analysis and a genetic search based method for Android malware detection
    Firdaus, Ahmad
    Anuar, Nor Badrul
    Karim, Ahmad
    Ab Razak, Mohd Faizal
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (06) : 712 - 736