首页> 外文会议>Annual Conference on Privacy, Security and Trust >A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis
【24h】

A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis

机译:通过行为建模的Droids-Android恶意软件检测系列:静态与动态分析

获取原文

摘要

Following the increasing popularity of the mobile ecosystem, cybercriminals have increasingly targeted mobile ecosystems, designing and distributing malicious apps that steal information or cause harm to the device's owner. Aiming to counter them, detection techniques based on either static or dynamic analysis that model Android malware, have been proposed. While the pros and cons of these analysis techniques are known, they are usually compared in the context of their limitations e.g., static analysis is not able to capture runtime behaviors, full code coverage is usually not achieved during dynamic analysis, etc. Whereas, in this paper, we analyze the performance of static and dynamic analysis methods in the detection of Android malware and attempt to compare them in terms of their detection performance, using the same modeling approach.To this end, we build on MAMADROID, a state-of-the-art detection system that relies on static analysis to create a behavioral model from the sequences of abstracted API calls. Then, aiming to apply the same technique in a dynamic analysis setting, we modify CHIMP, a platform recently proposed to crowdsource human inputs for app testing, in order to extract API calls' sequences from the traces produced while executing the app on a CHIMP virtual device. We call this system AUNTIEDROID and instantiate it by using both automated (Monkey) and usergenerated inputs. We find that combining both static and dynamic analysis yields the best performance, with $F -$measure reaching 0.92. We also show that static analysis is at least as effective as dynamic analysis, depending on how apps are stimulated during execution, and investigate the reasons for inconsistent misclassifications across methods.
机译:随着移动生态系统的日益普及,网络犯罪分子越来越多地将目标对准移动生态系统,设计和分发窃取信息或对设备所有者造成损害的恶意应用。为了解决这些问题,已经提出了基于建模Android恶意软件的基于静态或动态分析的检测技术。尽管这些分析技术的优缺点是众所周知的,但通常会在其局限性的背景下进行比较,例如,静态分析无法捕获运行时行为,动态分析期间通常无法实现完整的代码覆盖率等。本文将分析静态和动态分析方法在检测Android恶意软件中的性能,并尝试使用相同的建模方法对它们的检测性能进行比较。为此,我们建立在状态为MAMADROID的基础上依靠静态分析从抽象的API调用序列创建行为模型的先进检测系统。然后,为了在动态分析环境中应用相同的技术,我们修改了CHIMP,这是一个最近提出的用于众包人工输入以进行应用程序测试的平台,以便从在CHIMP虚拟机上执行应用程序时产生的跟踪信息中提取API调用的序列。设备。我们将此系统称为AUNTIEDROID,并通过使用自动化(猴子)和用户生成的输入实例化该系统。我们发现,将静态和动态分析结合起来可获得最佳性能,$ F-$ measure达到0.92。我们还表明,静态分析至少与动态分析一样有效,这取决于在执行过程中如何激发应用程序,并调查各种方法中错误分类不一致的原因。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号