Prikladnaya Diskretnaya Matematika
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika, 2017, Number 36, Pages 84–105
DOI: https://doi.org/10.17223/20710410/36/7
(Mi pdm584)
 

This article is cited in 2 scientific papers (total in 2 papers)

Mathematical Foundations of Computer Security

Automated static analysis and classification of Android malware using permission and API calls models

A. A. Skovoroda, D. Y. Gamayunov

Lomonosov Moscow State University, Moscow, Russia
Full-text PDF (795 kB) Citations (2)
References:
Abstract: In this paper, we propose a heuristic approach to static analysis of Android applications based on matching suspicious applications with the predefined malware models. Static models are built from Android capabilities and Android Framework API call chains used by the application. All of the analysis steps and model construction are fully automated. Therefore, the method can be easily deployed as one of the automated checks provided by mobile application marketplaces or other interested organizations.
Using the proposed method, we analyzed the Drebin and ISCX malware collections in order to find possible relationships and dependencies between samples in collections, and a large fraction of Google Play apps collected between 2013 and 2016 representing benign data. Analysis results show that a combination of relatively simple static features represented by permissions and API call chains is enough to perform binary classification between malware and benign apps, and even find the corresponding malware family, with an appropriate false positive rate of about 3 %. Malware collections exploration results show that modern Android malware rarely uses obfuscation or encryption techniques to make static analysis more difficult, which is quite the opposite of what we see in the case of the “Wintel” endpoint platform family.
We also provide the experiment-based comparison with the previously proposed state-of-the-art Android malware detection method adagio. This method outperforms our proposed method in resulting detection coverage (98 vs 91 % of malicious samples are covered) while at the same time causing a significant number of false alarms corresponding to 9.3 % of benign applications on average.
Keywords: static analysis, Android malware.
Bibliographic databases:
Document Type: Article
UDC: 004.492.3
Language: Russian
Citation: A. A. Skovoroda, D. Y. Gamayunov, “Automated static analysis and classification of Android malware using permission and API calls models”, Prikl. Diskr. Mat., 2017, no. 36, 84–105
Citation in format AMSBIB
\Bibitem{SkoGam17}
\by A.~A.~Skovoroda, D.~Y.~Gamayunov
\paper Automated static analysis and classification of Android malware using permission and API calls models
\jour Prikl. Diskr. Mat.
\yr 2017
\issue 36
\pages 84--105
\mathnet{http://mi.mathnet.ru/pdm584}
\crossref{https://doi.org/10.17223/20710410/36/7}
Linking options:
  • https://www.mathnet.ru/eng/pdm584
  • https://www.mathnet.ru/eng/pdm/y2017/i2/p84
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Прикладная дискретная математика
    Statistics & downloads:
    Abstract page:263
    Full-text PDF :101
    References:34
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024