首页> 外文会议>International Joint Conference on e-Business and Telecommunications >DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling
【24h】

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

机译:Dadidroid:通过加权定向呼叫图建模检测Android恶意软件的混淆弹性工具

获取原文

摘要

With the number of new mobile malware instances increasing by over 50% annually since 2012 (McAfee, 2017), malware embedding in mobile apps is arguably one of the most serious security issues mobile platforms are exposed to. While obfuscation techniques are successfully used to protect the intellectual property of apps' developers, they are unfortunately also often used by cybercriminals to hide malicious content inside mobile apps and to deceive malware detection tools. As a consequence, most of mobile malware detection approaches fail in differentiating between benign and obfuscated malicious apps. We examine the graph features of mobile apps code by building weighted directed graphs of the API calls, and verify that malicious apps often share structural similarities that can be used to differentiate them from benign apps, even under a heavily "polluted" training set where a large majority of the apps are obfuscated. We present DaDiDroid an Android malware app detection tool that leverages features of the weighted directed graphs of API calls to detect the presence of malware code in (obfuscated) Android apps. We show that DaDiDroid significantly outperforms MaMaDroid (Mariconti et al., 2017), a recently proposed malware detection tool that has been proven very efficient in detecting malware in a clean non-obfuscated environment. We evaluate DaDiDroid's accuracy and robustness against several evasion techniques using various datasets for a total of 43,262 benign and 20,431 malware apps. We show that DaDiDroid correctly labels up to 96% of Android malware samples, while achieving an 91% accuracy with an exclusive use of a training set of obfuscated apps.
机译:自2012年以来每年增加50%以上的新移动恶意软件实例(McAfee,2017),移动应用中的恶意软件嵌入可以说是移动平台暴露于移动平台的最严重问题之一。虽然混淆技术成功用于保护应用程序开发人员的知识产权,但遗憾的是,网络犯罪分子也经常使用网络犯罪分子来隐藏移动应用程序内的恶意内容并欺骗恶意软件检测工具。因此,大多数移动恶意软件检测方法都失败了良好的良性和混淆恶意应用程序之间的区别。我们通过构建API调用的加权定向图来检查移动应用程序代码的图表功能,并验证恶意应用程序通常共享可用于区分其与良性应用程序的结构相似之处,即使在其中的重大“污染”培训集中大多数应用程序都被滥用。我们介绍Dadidroid一个Android Malware应用程序检测工具,它利用API调用的加权定向图的功能来检测(混淆)Android应用程序中的恶意软件代码的存在。我们表明,Dadidroid显着优于Mamadroid(MariConti等,2017),最近提出的恶意软件检测工具被证明是在清洁的非混淆环境中检测恶意软件的效率非常有效。我们使用各种数据集评估Dadidroid的准确性和稳健性,共使用各种数据集共有43,262个良性和20,431个恶意软件应用程序。我们表明Dadidroid正确地标记了高达Android恶意软件样本的96%,同时可以使用培训的混淆应用程序独家使用了91%的准确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号