首页> 外文会议>2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing >ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family
【24h】

ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family

机译:ANTSdroid:使用RasMMA算法生成Android恶意软件家族的恶意软件行为特征

获取原文
获取原文并翻译 | 示例

摘要

Malware developers often use various obfuscation techniques to generate polymorphic and metamorphic versions of malicious programs. As a result, variants of a malware family generally exhibit resembling behavior, and most importantly, they possess certain common essential codes so to achieve the same designed purpose. Meantime, keeping up with new variants and generating signatures for each individual in a timely fashion has been costly and inefficient for anti-virus software companies. It motivates us the idea of no more dancing with variants. In this paper, we aim to find a malware family's main characteristic operations or activities directly related to its intent. We propose a novel automatic dynamic Android profiling system and malware family runtime behavior signature generation method called Runtime API sequence Motif Mining Algorithm (RasMMA) based on the analysis of the sensitive and permission-related execution traces of the threads and processes of a set of variant APKs of a malware family. We show the effectiveness of using the generated family signature to detect new variants using real-world dataset. Moreover, current anti-malware tools usually treat detection models as a black box for classification and offer little explanations on how malwares behave and how they proceed step by step to infiltrate targeted system and achieve the goal. We take malware family DroidKungFu as a case study to illustrate that the generated family signature indeed captures key malicious activities of the family.
机译:恶意软件开发人员经常使用各种混淆技术来生成恶意程序的多态和变态版本。结果,恶意软件家族的变体通常表现出相似的行为,最重要的是,它们拥有某些通用的基本代码,从而实现了相同的设计目的。同时,对于反病毒软件公司来说,跟上新的变种并及时为每个人生成签名对于代价昂贵且效率低下的公司而言。它激发了我们不再跳舞的想法。在本文中,我们旨在寻找与恶意软件家族意图直接相关的主要特征性操作或活动。基于对一组变体的线程和进程的敏感和许可相关执行轨迹的分析,我们提出了一种新颖的自动动态Android分析系统和恶意软件家族运行时行为签名生成方法,称为运行时API序列主题挖掘算法(RasMMA)。恶意软件家族的APK。我们展示了使用生成的族签名使用真实数据集检测新变体的有效性。而且,当前的反恶意软件工具通常将检测模型视为分类的黑匣子,并且几乎没有解释恶意软件的行为以及它们如何逐步渗透到目标系统并实现目标。我们以恶意软件家族DroidKungFu为例,说明生成的家族签名确实捕获了该家族的关键恶意活动。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号