Drebin: Effective and Explainable Detection of Android Malware in Your Pocket

被引:1175
作者
Arp, Daniel [1 ]
Spreitzenbarth, Michael [2 ]
Huebner, Malte [1 ]
Gascon, Hugo [1 ]
Rieck, Konrad [1 ]
机构
[1] Univ Gottingen, Gottingen, Germany
[2] Siemens AG, Munich, Germany
来源
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014) | 2014年
关键词
D O I
10.14722/ndss.2014.23247
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious applications pose a threat to the security of the Android platform. The growing amount and diversity of these applications render conventional defenses largely ineffective and thus Android smartphones often remain unprotected from novel malware. In this paper, we propose DREBIN, a lightweight method for detection of Android malware that enables identifying malicious applications directly on the smartphone. As the limited resources impede monitoring applications at run-time, DREBIN performs a broad static analysis, gathering as many features of an application as possible. These features are embedded in a joint vector space, such that typical patterns indicative for malware can be automatically identified and used for explaining the decisions of our method. In an evaluation with 123,453 applications and 5,560 malware samples DREBIN outperforms several related approaches and detects 94% of the malware with few false alarms, where the explanations provided for each detection reveal relevant properties of the detected malware. On five popular smartphones, the method requires 10 seconds for an analysis on average, rendering it suitable for checking downloaded applications directly on the device.
引用
收藏
页数:12
相关论文
共 39 条
[1]  
Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
[2]  
[Anonymous], 2011, USENIX SECURITY S
[3]  
[Anonymous], 2012, P 10 INT C MOB SYST
[4]  
[Anonymous], 2012, MOB THREAT REP 2012 MOB THREAT REP 2012
[5]  
[Anonymous], 2013, Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY)
[6]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[7]  
[Anonymous], 2014, Communications of the ACM, DOI DOI 10.1145/2494522
[8]  
[Anonymous], 2012, Proceedings of ACM Symposium on Access Control Models and Technologies
[9]  
[Anonymous], 2011, SECURITY ALERT GOLDD
[10]   A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android [J].
Barrera, David ;
Kayacik, H. Guenes ;
van Oorschot, P. C. ;
Somayaji, Anil .
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, :73-84