首页> 外文期刊>Computers & Security >DroidNative: Automating and optimizing detection of Android native code malware variants
【24h】

DroidNative: Automating and optimizing detection of Android native code malware variants

机译:DroidNative:自动和优化对Android本机代码恶意软件变种的检测

获取原文
获取原文并翻译 | 示例
           

摘要

According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively (-99%) on the Android platform. Malware writers are applying stealthy mutations (obfuscations) to create malware variants, thwarting detection by signature-based detectors. In addition, the plethora of more sophisticated detectors making use of static analysis techniques to detect such variants operate only at the bytecode level, meaning that malware embedded in native code goes undetected. A recent study shows that 86% of the most popular Android applications contain native code, making native code malware a plausible threat vector. This paper proposes DroidNative, an Android malware detector that uses specific control flow patterns to reduce the effect of obfuscations and provides automation. As far as we know, DroidNative is the first system that builds cross-platform (x86 and ARM) semantic-based signatures at the Android native code level, allowing the system to detect malware embedded in either bytecode or native code. When tested with a dataset of 5490 samples, DroidNative achieves a detection rate (DR) of 93.57% and a false positive rate of 2.7%. When tested with traditional malware variants, it achieves a DR of 99.48%, compared to the DRs of academic and commercial tools that range from 8.33% to 93.22%.
机译:根据赛门铁克和F-Secure威胁报告,2013和2014年移动恶意软件的开发几乎一直(-99%)始终集中在Android平台上。恶意软件编写者正在应用隐形突变(混淆)来创建恶意软件变体,从而阻碍了基于签名的检测器的检测。此外,利用静态分析技术来检测此类变体的大量更复杂的检测器仅在字节码级别上运行,这意味着无法检测到嵌入本机代码中的恶意软件。最近的一项研究表明,最流行的Android应用程序中有86%包含本机代码,从而使本机代码恶意软件成为一种可能的威胁向量。本文提出了DroidNative,这是一个Android恶意软件检测器,它使用特定的控制流模式来减少混淆的影响并提供自动化。据我们所知,DroidNative是第一个在Android本机代码级别构建基于跨平台(x86和ARM)基于语义的签名的系统,从而使该系统能够检测嵌入在字节码或本机代码中的恶意软件。当使用5490个样本的数据集进行测试时,DroidNative的检出率(DR)为93.57%,假阳性率为2.7%。当使用传统的恶意软件变体进行测试时,其灾难恢复率为99.48%,而学术和商业工具的灾难恢复率则为8.33%至93.22%。

著录项

  • 来源
    《Computers & Security》 |2017年第3期|230-246|共17页
  • 作者单位

    Department of Computer Engineering, Gebze Technical University, Gebze, Turkey;

    Department of Electrical Engineering and Computer Science, Northwestern University, Euanston, IL, USA;

    Department of Computer Science and Engineering, Qatar University, Doha, Qatar;

    Department of Electrical Engineering and Computer Science, Northwestern University, Euanston, IL, USA;

    Department of Computer Science, University of Wisconsin-Madison, Madison, WI, USA;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Android native code; Malware analysis; Malware variant detection; Control flow analysis; Data mining;

    机译:Android本机代码;恶意软件分析;恶意软件变体检测;控制流分析;数据挖掘;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号