首页> 外文会议>IEEE Pacific Rim International Symposium on Dependable Computing >ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family
【24h】

ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family

机译:Atsdroid:使用Rasmma算法生成Android恶意软件系列的恶意软件行为特征

获取原文
获取外文期刊封面目录资料

摘要

Malware developers often use various obfuscation techniques to generate polymorphic and metamorphic versions of malicious programs. As a result, variants of a malware family generally exhibit resembling behavior, and most importantly, they possess certain common essential codes so to achieve the same designed purpose. Meantime, keeping up with new variants and generating signatures for each individual in a timely fashion has been costly and inefficient for anti-virus software companies. It motivates us the idea of no more dancing with variants. In this paper, we aim to find a malware family's main characteristic operations or activities directly related to its intent. We propose a novel automatic dynamic Android profiling system and malware family runtime behavior signature generation method called Runtime API sequence Motif Mining Algorithm (RasMMA) based on the analysis of the sensitive and permission-related execution traces of the threads and processes of a set of variant APKs of a malware family. We show the effectiveness of using the generated family signature to detect new variants using real-world dataset. Moreover, current anti-malware tools usually treat detection models as a black box for classification and offer little explanations on how malwares behave and how they proceed step by step to infiltrate targeted system and achieve the goal. We take malware family DroidKungFu as a case study to illustrate that the generated family signature indeed captures key malicious activities of the family.
机译:恶意软件开发人员经常使用各种混淆技术来生成可恶意程序的多态和变质版本。因此,恶意软件系列的变体通常表现出类似的行为,最重要的是,它们拥有某些共同的必备代码,以实现相同的设计目的。与此同时,保持新的变体并及时为每个人生成签名,对防病毒软件公司的昂贵且效率低。它激励着我们的想法与变体没有更多的舞蹈。在本文中,我们的目标是寻找恶意软件家庭的主要特征操作或与其意图直接相关的活动。我们提出了一种新颖的自动动态Android分析系统和恶意软件系列运行行为签名生成方法,称为运行时API序列挖掘算法(Rasmma),基于对一组变体的线程和进程的敏感和权限相关的执行迹线的分析艾滋病安全软件家庭。我们展示了使用生成的家庭签名来使用现实数据集检测新变体的有效性。此外,当前的反恶意软件工具通常将检测模型视为一个黑匣子,以进行分类,并对恶意者的表现方式以及它们如何逐步进行渗透到目标系统并实现目标。我们将恶意软件系列Droidkungfu作为一个案例研究来说明生成的家庭签名确实捕获了家庭的关键恶意活动。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号