Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

IntDroid: Android Malware Detection Based on API Intimacy Analysis

Published: 08 May 2021 Publication History

Abstract

Android, the most popular mobile operating system, has attracted millions of users around the world. Meanwhile, the number of new Android malware instances has grown exponentially in recent years. On the one hand, existing Android malware detection systems have shown that distilling the program semantics into a graph representation and detecting malicious programs by conducting graph matching are able to achieve high accuracy on detecting Android malware. However, these traditional graph-based approaches always perform expensive program analysis and suffer from low scalability on malware detection. On the other hand, because of the high scalability of social network analysis, it has been applied to complete large-scale malware detection. However, the social-network-analysis-based method only considers simple semantic information (i.e., centrality) for achieving market-wide mobile malware scanning, which may limit the detection effectiveness when benign apps show some similar behaviors as malware.
In this article, we aim to combine the high accuracy of traditional graph-based method with the high scalability of social-network-analysis--based method for Android malware detection. Instead of using traditional heavyweight static analysis, we treat function call graphs of apps as complex social networks and apply social-network--based centrality analysis to unearth the central nodes within call graphs. After obtaining the central nodes, the average intimacies between sensitive API calls and central nodes are computed to represent the semantic features of the graphs. We implement our approach in a tool called IntDroid and evaluate it on a dataset of 3,988 benign samples and 4,265 malicious samples. Experimental results show that IntDroid is capable of detecting Android malware with an F-measure of 97.1% while maintaining a True-positive Rate of 99.1%. Although the scalability is not as fast as a social-network-analysis--based method (i.e., MalScan), compared to a traditional graph-based method, IntDroid is more than six times faster than MaMaDroid. Moreover, in a corpus of apps collected from GooglePlay market, IntDroid is able to identify 28 zero-day malware that can evade detection of existing tools, one of which has been downloaded and installed by more than ten million users. This app has also been flagged as malware by six anti-virus scanners in VirusTotal, one of which is Symantec Mobile Insight.

References

[1]
2014. Permission-based method. Retrieved from http://infosec.bjtu.edu.cn/wangwei/?page_id=85/.
[2]
2017. MaMaDroid. Retrieved from https://bitbucket.org/gianluca_students/mamadroid_code/.
[3]
2018. Cyber attacks on Android devices on the rise. Retrieved from https://www.gdatasoftware.com/blog/2018/11/31255-cyber-attacks-on-android-devices-on-the-rise/.
[4]
2018. Worldwide Smartphone Sales to End Users by Operating System in 2Q18. Retrieved from https://www.gartner.com/en/newsroom/press-releases/2018-08-28-gartner-says-huawei-secured-no-2-worldwide-smartphone-vendor-spot-surpassing-apple-in-second-quarter/.
[5]
2019. APK Protect—Provide Android APK Encryption and Protection. Retrieved from https://sourceforge.net/projects/apkprotect/.
[6]
2019. scikit-learn. Retrieved from https://scikit-learn.org/.
[7]
2019. VirusTotal—Free online virus, malware and URL scanner. Retrieved from https://www.virustotal.com/.
[8]
2020. SanDroid—An automatic Android application analysis system. Retrieved from http://sanddroid.xjtu.edu.cn/.
[9]
Yousra Aafer, Wenliang Du, and Heng Yin. 2013. Droidapiminer: Mining api-level features for robust malware detection in android. In Proceedings of the 9th International Conference on Security and Privacy in Communication Systems (SecureComm’13).
[10]
Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho Chung, and Wenke Lee. 2018. Improving accuracy of android malware detection with lightweight contextual awareness. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC’18).
[11]
Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. 2016. Androzoo: Collecting millions of android apps for the research community. In Proceedings of the 13th Working Conference on Mining Software Repositories (MSR’16).
[12]
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. Drebin: Effective and explainable detection of android malware in your pocket. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS’14).
[13]
Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. 2012. Pscout: Analyzing the Android permission specification. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’12).
[14]
Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, and Eric Bodden. 2015. Mining apps for abnormal usage of sensitive data. In Proceedings of the 37th International Conference on Software Engineering (ICSE’15).
[15]
Kai Chen, Peng Liu, and Yingjun Zhang. 2014. Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In Proceedings of the 36th International Conference on Software Engineering (ICSE’14).
[16]
Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale. In Proceedings of the 24th USENIX Security Symposium (USENIX Security’15).
[17]
Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, and Kui Ren. 2018. Android HIV: A study of repackaging malware for evading machine-learning detection. IEEE Trans. Info. Forens. Secur. (2018).
[18]
Nigel Coles. 2001. It’s not what you know-It’s who you know that counts. Analysing serious crime groups as social networks. Brit. J. Criminol. (2001).
[19]
Anthony Desnos et al. 2011. Androguard. Retrieved from https://github.com/androguard/androguard.
[20]
William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2014. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (2014).
[21]
Ming Fan, Xiapu Luo, Jun Liu, Chunyin Nong, Qinghua Zheng, and Ting Liu. 2019. CTDroid: Leveraging a corpus of technical blogs for android malware analysis. IEEE Trans. Reliabil. (2019).
[22]
Katherine Faust. 1997. Centrality in affiliation networks. Soc. Netw. (1997).
[23]
Ruitao Feng, Sen Chen, Xiaofei Xie, Lei Ma, Guozhu Meng, Yang Liu, and Shang-Wei Lin. 2019. Mobidroid: A performance-sensitive malware detection system on mobile platform. In Proceedings of the 24th International Conference on Engineering of Complex Computer Systems (ICECCS’19).
[24]
Yu Feng, Saswat Anand, Isil Dillig, and Alex Aiken. 2014. Apposcopy: Semantics-based detection of android malware through static analysis. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE’14).
[25]
Yu Feng, Osbert Bastani, Ruben Martins, Isil Dillig, and Saswat Anand. 2016. Automated synthesis of semantic malware signatures using maximum satisfiability. Retrieved from https://arXiv:1608.06254.
[26]
Linton C. Freeman. 1978. Centrality in social networks conceptual clarification. Soc. Netw. (1978).
[27]
Joshua Garcia, Mahmoud Hammad, and Sam Malek. 2018. Lightweight, obfuscation-resilient detection and family identification of Android malware. ACM Trans. Softw. Eng. Methodol. (2018).
[28]
Hugo Gascon, Fabian Yamaguchi, Daniel Arp, and Konrad Rieck. 2013. Structural detection of android malware using embedded call graphs. In Proceedings of the ACM Workshop on Artificial Intelligence and Security (WAIS’13).
[29]
Michael C. Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. 2012. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS’12).
[30]
Roger Guimera, Stefano Mossa, Adrian Turtschi, and L. A. Nunes Amaral. 2005. The worldwide air transportation network: Anomalous centrality, community structure, and cities’ global roles. Proc. Natl. Acad. Sci. U.S.A. (2005).
[31]
Chun-Ying Huang, Yi-Ting Tsai, and Chung-Han Hsu. 2013. Performance evaluation on permission-based detection for android malware. In Advances in Intelligent Systems and Applications.
[32]
Heqing Huang, Sencun Zhu, Peng Liu, and Dinghao Wu. 2013. A framework for evaluating mobile app repackaging detection algorithms. In Proceedings of the 2013 International Conference on Trust and Trustworthy Computing (ICTTC’13).
[33]
Médéric Hurier, Guillermo Suarez-Tangil, Santanu Kumar Dash, Tegawendé F. Bissyandé, Yves Le Traon, Jacques Klein, and Lorenzo Cavallaro. 2017. Euphony: Harmonious unification of cacophonous anti-virus vendor labels for Android malware. In Proceedings of the 14th International Conference on Mining Software Repositories (MSR’17).
[34]
Hawoong Jeong, Sean P. Mason, A.-L. Barabási, and Zoltan N. Oltvai. 2001. Lethality and centrality in protein networks. Nature (2001).
[35]
Leo Katz. 1953. A new status index derived from sociometric analysis. Psychometrika (1953).
[36]
Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-an, and Heng Ye. 2018. Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Industr. Info. (2018).
[37]
Li Li, Tegawendé F. Bissyandé, Damien Octeau, and Jacques Klein. 2016. Droidra: Taming reflection to support whole-program analysis of android apps. In Proceedings of the 25th International Symposium on Software Testing and Analysis (ISSTA’16).
[38]
Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor Van Der Veen, and Christian Platzer. 2014. Andrubis--1,000,000 apps later: A view on current Android malware behaviors. In Proceedings of the International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS’14).
[39]
Xiaoming Liu, Johan Bollen, Michael L. Nelson, and Herbert Van de Sompel. 2005. Co-authorship networks in the digital library research community. Info. Process. Manage. (2005).
[40]
Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, and Giovanni Vigna. 2018. Using loops for malware classification resilient to feature-unaware perturbations. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC’18).
[41]
Henry B. Mann and Donald R. Whitney. 1947. On a test of whether one of two random variables is stochastically larger than the other. Ann. Math. Stat. (1947).
[42]
Massimo Marchiori and Vito Latora. 2000. Harmony in the small-world. Physica A: Stat. Mech. Appl. (2000).
[43]
Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, and Gianluca Stringhini. 2017. MAMADROID: Detecting android malware by building markov chains of behavioral models. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS’17).
[44]
Guozhu Meng, Yinxing Xue, Zhengzi Xu, Yang Liu, Jie Zhang, and Annamalai Narayanan. 2016. Semantic modelling of android malware for effective malware comprehension, detection, and classification. In Proceedings of the 25th International Symposium on Software Testing and Analysis (ISSTA’16).
[45]
Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, and Yang Liu. 2018. A multi-view context-aware approach to Android malware detection and malicious code localization. Empir. Softw. Eng. (2018).
[46]
Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, and Ian Molloy. 2012. Using probabilistic generative models for ranking risks of android apps. In Proceedings of the ACM Conference on Computer and communications security (CCS’12).
[47]
Vaibhav Rastogi, Yan Chen, and Xuxian Jiang. 2013. Catch me if you can: Evaluating android anti-malware against transformation attacks. IEEE Trans. Info. Forensics Secur. (2013).
[48]
Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, and Maarten Van Steen. 2012. Prudent practices for designing malware experiments: Status quo and outlook. In Proceedings of the IEEE Symposium on Security and Privacy (S&P’’12).
[49]
Andrea Saracino, Daniele Sgandurra, Gianluca Dini, and Fabio Martinelli. 2018. Madam: Effective and efficient behavior-based android malware detection and prevention. IEEE Trans. Depend. Secure Comput. (2018).
[50]
Bhaskar Pratim Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru, and Ian Molloy. 2012. Android permissions: A perspective combining risks and benefits. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (ACMT’12).
[51]
Samuel Sanford Shapiro and Martin B. Wilk. 1965. An analysis of variance test for normality (complete samples). Biometrika (1965).
[52]
Guillermo Suarez-Tangil and Gianluca Stringhini. 2018. Eight years of rider measurement in the android malware ecosystem: Evolution and lessons learned. Retrieved from https://arXiv:1801.08115.
[53]
Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang. 2014. Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Info. Forens. Secur. (2014).
[54]
Yueming Wu, Xiaodi Li, Deqing Zou, Wei Yang, Xin Zhang, and Hai Jin. 2019. MalScan: Fast market-wide mobile malware scanning by social-network centrality analysis. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE’19).
[55]
Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, and Dinghao Wu. 2017. Adaptive unpacking of Android apps. In Proceedings of the International Conference on Software Engineering (ICSE’17).
[56]
Wei Yang, Mukul Prasad, and Tao Xie. 2018. Enmobile: Entity-based characterization and analysis of mobile malware. In Proceedings of the 40th International Conference on Software Engineering (ICSE’18).
[57]
Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, and William Enck. 2015. Appcontext: Differentiating malicious and benign mobile app behaviors using context. In Proceedings of the 37th International Conference on Software Engineering (ICSE’15).
[58]
Mu Zhang, Yue Duan, Heng Yin, and Zhiruo Zhao. 2014. Semantics-aware android malware classification using weighted contextual api dependency graphs. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’14).
[59]
Yueqian Zhang, Xiapu Luo, and Haoyang Yin. 2015. Dexhunter: Toward extracting hidden code from packed android applications. In Proceedings of the European Symposium on Research in Computer Security (ESORICS’15).
[60]
Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS’12).

Cited By

View all
  • (2024)An Empirical Study on Android Malware Characterization by Social Network AnalysisIEEE Transactions on Reliability10.1109/TR.2023.330438973:1(757-770)Online publication date: Mar-2024
  • (2024)Android Malware Detection Method Based on CNN and DNN Bybrid MechanismIEEE Transactions on Industrial Informatics10.1109/TII.2024.336301620:5(7744-7753)Online publication date: May-2024
  • (2024)LTAChecker: Lightweight Android Malware Detection Based on Dalvik Opcode Sequences Using Attention Temporal NetworksIEEE Internet of Things Journal10.1109/JIOT.2024.339455511:14(25371-25381)Online publication date: 15-Jul-2024
  • Show More Cited By

Index Terms

  1. IntDroid: Android Malware Detection Based on API Intimacy Analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Software Engineering and Methodology
    ACM Transactions on Software Engineering and Methodology  Volume 30, Issue 3
    Continuous Special Section: AI and SE
    July 2021
    600 pages
    ISSN:1049-331X
    EISSN:1557-7392
    DOI:10.1145/3450566
    • Editor:
    • Mauro Pezzè
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 May 2021
    Accepted: 01 December 2020
    Revised: 01 December 2020
    Received: 01 February 2020
    Published in TOSEM Volume 30, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. API intimacy
    2. Android malware
    3. centrality
    4. social network

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • the Key Program of National Science Foundation of China
    • the Key-Area Research and Development Program of Guangdong Province
    • the Shenzhen Fundamental Research Program

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)138
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 12 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)An Empirical Study on Android Malware Characterization by Social Network AnalysisIEEE Transactions on Reliability10.1109/TR.2023.330438973:1(757-770)Online publication date: Mar-2024
    • (2024)Android Malware Detection Method Based on CNN and DNN Bybrid MechanismIEEE Transactions on Industrial Informatics10.1109/TII.2024.336301620:5(7744-7753)Online publication date: May-2024
    • (2024)LTAChecker: Lightweight Android Malware Detection Based on Dalvik Opcode Sequences Using Attention Temporal NetworksIEEE Internet of Things Journal10.1109/JIOT.2024.339455511:14(25371-25381)Online publication date: 15-Jul-2024
    • (2024)DCDroidIET Information Security10.1049/2024/66522172024Online publication date: 1-Jan-2024
    • (2024)PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detectionScientific Reports10.1038/s41598-024-60982-y14:1Online publication date: 10-May-2024
    • (2024)Android malware detection through centrality analysis of applications networkApplied Soft Computing10.1016/j.asoc.2024.112058165(112058)Online publication date: Nov-2024
    • (2024)A data-driven multi-perspective approach to cybersecurity knowledge discovery through topic modellingAlexandria Engineering Journal10.1016/j.aej.2024.07.044107(374-389)Online publication date: Nov-2024
    • (2024)An efficient security testing for android application based on behavior and activities using RFE-MLP and ensemble classifierMultimedia Tools and Applications10.1007/s11042-024-19517-wOnline publication date: 20-Jun-2024
    • (2023)Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and ExplanationProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3616358(1611-1622)Online publication date: 30-Nov-2023
    • (2023)VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph ConvolutionACM Transactions on Privacy and Security10.1145/358538626:3(1-25)Online publication date: 14-Apr-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media