首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis
【24h】

DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis

机译:DAPASA:通过敏感子图分析检测Android搭载的应用

获取原文
获取原文并翻译 | 示例
       

摘要

With the exponential growth of smartphone adoption, malware attacks on smartphones have resulted in serious threats to users, especially those on popular platforms, such as Android. Most Android malware is generated by piggybacking malicious payloads into benign applications (apps), which are called piggybacked apps. In this paper, we propose DAPASA, an approach to detect Android piggybacked apps through sensitive subgraph analysis. Two assumptions are established to reflect the different invocation patterns of sensitive APIs in the injected malicious payloads (rider) of a piggybacked app and in its host app (carrier). With these two assumptions, DAPASA generates a sensitive subgraph (SSG) to profile the most suspicious behavior of an app. Five features are constructed from SSG to depict the invocation patterns. The five features are fed into the machine learning algorithms to detect whether the app is piggybacked or benign. DAPASA is evaluated on a large real-world data set consisting of 2551 piggybacked apps and 44 921 popular benign apps. Extensive evaluation results demonstrate that the proposed approach exhibits an impressive detection performance compared with that of three baseline approaches even with only five numeric features. Furthermore, the proposed approach can complement permission-based approaches and API-based approaches with the combination of our five features from a new perspective of the invocation structure.
机译:随着智能手机采用率的指数级增长,对智能手机的恶意软件攻击已对用户,尤其是在流行平台(如Android)上的用户造成了严重威胁。大多数Android恶意软件是通过将恶意有效负载搭载在良性应用程序(应用程序)中而产生的,这些应用程序称为搭载应用程序。在本文中,我们提出了DAPASA,这是一种通过敏感子图分析来检测Android搭载应用的方法。建立两个假设来反映敏感API的不同调用模式,这些敏感API在搭载的应用程序及其宿主应用程序(运营商)的注入的恶意有效负载(代理)中。基于这两个假设,DAPASA生成一个敏感子图(SSG)来描述应用程序中最可疑的行为。 SSG构建了五个功能来描述调用模式。这五项功能被馈送到机器学习算法中,以检测应用是搭载还是良性的。对DAPASA的评估是在一个大型的真实数据集上进行的,该数据集包含2551个搭载应用和44921个流行的良性应用。广泛的评估结果表明,即使只有五个数值特征,与三个基线方法相比,该方法仍具有出色的检测性能。此外,从调用结构的新角度来看,所提出的方法可以结合我们的五个功能,对基于权限的方法和基于API的方法进行补充。

著录项

  • 来源
  • 作者单位

    Department of Computer Science and Technology, MOEKLINNS, Xi’an Jiaotong University, Xi’an, China;

    Department of Computer Science and Technology, MOEKLINNS, Xi’an Jiaotong University, Xi’an, China;

    Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China;

    Department of Computer Science, Union University, Jackson, TN, USA;

    School of Computer Science and Technology, Xi’an University of Posts and Telecommunications, Xi’an, China;

    Department of Computer Science and Technology, MOEKLINNS, Xi’an Jiaotong University, Xi’an, China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Malware; Feature extraction; Androids; Humanoid robots; Payloads; Sensitivity; Frequency measurement;

    机译:恶意软件;特征提取;Android;类人机器人;有效载荷;灵敏度;频率测量;
  • 入库时间 2022-08-17 13:05:56

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号