Logo del repository
  1. Home
 
Opzioni

Detecting Android malware using sequences of system calls

Canfora, Gerardo
•
MEDVET, Eric
•
Mercaldo, Francesco
•
Visaggio, Corrado Aaron
2015
  • conference object

Abstract
The increasing diffusion of smart devices, along with the dynamism of the mobile applications ecosystem, are boosting the production of malware for the Android platform. So far, many different methods have been developed for detecting Android malware, based on either static or dynamic analysis. The main limitations of existing methods include: low accuracy, proneness to evasion techniques, and weak validation, often limited to emulators or modified kernels. We propose an Android malware detection method, based on sequences of system calls, that overcomes these limitations. The assumption is that malicious behaviors (e.g., sending high premium rate SMS, cyphering data for ransom, botnet capabilities, and so on) are implemented by specific system calls sequences: yet, no apriori knowledge is available about which sequences are associated with which malicious behaviors, in particular in the mobile applications ecosystem where new malware and non-malware applications continuously arise. Hence, we use Machine Learning to automatically learn these associations (a sort of "fingerprint" of the malware); then we exploit them to actually detect malware. Experimentation on 20000 execution traces of 2000 applications (1000 of them being malware belonging to different malware families), performed on a real device, shows promising results: we obtain a detection accuracy of 97%. Moreover, we show that the proposed method can cope with the dynamism of the mobile apps ecosystem, since it can detect unknown malware.
DOI
10.1145/2804345.2804349
Archivio
http://hdl.handle.net/11368/2864920
info:eu-repo/semantics/altIdentifier/scopus/2-s2.0-84959302341
Diritti
closed access
license:digital rights management non definito
license:digital rights management non definito
FVG url
https://arts.units.it/request-item?handle=11368/2864920
Soggetti
  • malware

  • Android

  • dynamic analysi

  • security

  • machine learning

Scopus© citazioni
90
Data di acquisizione
Jun 7, 2022
Vedi dettagli
google-scholar
Get Involved!
  • Source Code
  • Documentation
  • Slack Channel
Make it your own

DSpace-CRIS can be extensively configured to meet your needs. Decide which information need to be collected and available with fine-grained security. Start updating the theme to match your nstitution's web identity.

Need professional help?

The original creators of DSpace-CRIS at 4Science can take your project to the next level, get in touch!

Realizzato con Software DSpace-CRIS - Estensione mantenuta e ottimizzata da 4Science

  • Impostazioni dei cookie
  • Informativa sulla privacy
  • Accordo con l'utente finale
  • Invia il tuo Feedback