A static Android malicious code detection method based on multi-source fusion

被引:29
作者
Du, Yao [1 ]
Wang, Xiaoqing [2 ]
Wang, Junfeng [1 ]
机构
[1] Sichuan Univ, Coll Comp Sci, Chengdu 610065, Peoples R China
[2] Beijing Inst Syst Engn, Beijing 100101, Peoples R China
基金
中国国家自然科学基金;
关键词
Android malware; Dempster-Shafer theory; multi-source fusion; MALWARE DETECTION;
D O I
10.1002/sec.1248
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
The rapid development of mobile malwares makes the traditional signature-based and single-feature based malware detection methods a challenging task. The surge of new malwares with more complex structures and dynamic characteristics leads to efficient fusion of multi-source malicious information more difficult in detection. In this paper, we propose a new multi-source based method to detect Android malwares by emphasizing on the traditional static features, control flow graph, and repacking characteristics. Each category of features is treated as an independent information source in feature extracting rules building and classification. Then, the Dempster-Shafer algorithm is used to fuse these information sources. This method can improve accuracy of malware detection without adding too many instability characteristics that are extracted from disassembled codes, and have better performance in the resistance to code obfuscation technologies. To verify our method, different categories of apps are collected to build the dataset in our experiment. Based on the dataset, our method can achieve 97% detection accuracy and 1.9% false positive rate. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:3238 / 3246
页数:9
相关论文
共 15 条
[1]
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]
Blasing T, 2012, P 2010 5 INTERNATION, P55
[3]
Dempster AP, 2008, STUD FUZZ SOFT COMP, V219, P57
[4]
Enck W., 2010, P 9 USENIX C OP SYST, DOI DOI 10.1145/2494522
[5]
Gascon H., 2013, P ACM WORKSH ART INT, P45
[6]
Sahs J., 2012, 2012 European Intelligence and Security Informatics Conference (EISIC), P141, DOI 10.1109/EISIC.2012.34
[7]
MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID [J].
Sanz, Borja ;
Santos, Igor ;
Laorden, Carlos ;
Ugarte-Pedrero, Xabier ;
Nieves, Javier ;
Bringas, Pablo G. ;
Alvarez Maranon, Gonzalo .
CYBERNETICS AND SYSTEMS, 2013, 44 (6-7) :469-488
[8]
Sarma B. P., 2012, S ACC CONTR MOD TECH, DOI [10.1145/2295136.2295141, DOI 10.1145/2295136.2295141]
[9]
Shabtai A., 2010, Proceedings 2010 International Conference on Computational Intelligence and Security (CIS 2010), P329, DOI 10.1109/CIS.2010.77
[10]
Shafer G., 1976, A Mathematical Theory of Evidence, DOI 10.2307/1268172