Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

IntDroid: Android Malware Detection Based on API Intimacy Analysis

Published: 08 May 2021 Publication History
  • Get Citation Alerts
  • Abstract

    Android, the most popular mobile operating system, has attracted millions of users around the world. Meanwhile, the number of new Android malware instances has grown exponentially in recent years. On the one hand, existing Android malware detection systems have shown that distilling the program semantics into a graph representation and detecting malicious programs by conducting graph matching are able to achieve high accuracy on detecting Android malware. However, these traditional graph-based approaches always perform expensive program analysis and suffer from low scalability on malware detection. On the other hand, because of the high scalability of social network analysis, it has been applied to complete large-scale malware detection. However, the social-network-analysis-based method only considers simple semantic information (i.e., centrality) for achieving market-wide mobile malware scanning, which may limit the detection effectiveness when benign apps show some similar behaviors as malware.
    In this article, we aim to combine the high accuracy of traditional graph-based method with the high scalability of social-network-analysis--based method for Android malware detection. Instead of using traditional heavyweight static analysis, we treat function call graphs of apps as complex social networks and apply social-network--based centrality analysis to unearth the central nodes within call graphs. After obtaining the central nodes, the average intimacies between sensitive API calls and central nodes are computed to represent the semantic features of the graphs. We implement our approach in a tool called IntDroid and evaluate it on a dataset of 3,988 benign samples and 4,265 malicious samples. Experimental results show that IntDroid is capable of detecting Android malware with an F-measure of 97.1% while maintaining a True-positive Rate of 99.1%. Although the scalability is not as fast as a social-network-analysis--based method (i.e., MalScan), compared to a traditional graph-based method, IntDroid is more than six times faster than MaMaDroid. Moreover, in a corpus of apps collected from GooglePlay market, IntDroid is able to identify 28 zero-day malware that can evade detection of existing tools, one of which has been downloaded and installed by more than ten million users. This app has also been flagged as malware by six anti-virus scanners in VirusTotal, one of which is Symantec Mobile Insight.

    References

    [1]
    2014. Permission-based method. Retrieved from http://infosec.bjtu.edu.cn/wangwei/?page_id=85/.
    [2]
    2017. MaMaDroid. Retrieved from https://bitbucket.org/gianluca_students/mamadroid_code/.
    [3]
    2018. Cyber attacks on Android devices on the rise. Retrieved from https://www.gdatasoftware.com/blog/2018/11/31255-cyber-attacks-on-android-devices-on-the-rise/.
    [4]
    2018. Worldwide Smartphone Sales to End Users by Operating System in 2Q18. Retrieved from https://www.gartner.com/en/newsroom/press-releases/2018-08-28-gartner-says-huawei-secured-no-2-worldwide-smartphone-vendor-spot-surpassing-apple-in-second-quarter/.
    [5]
    2019. APK Protect—Provide Android APK Encryption and Protection. Retrieved from https://sourceforge.net/projects/apkprotect/.
    [6]
    2019. scikit-learn. Retrieved from https://scikit-learn.org/.
    [7]
    2019. VirusTotal—Free online virus, malware and URL scanner. Retrieved from https://www.virustotal.com/.
    [8]
    2020. SanDroid—An automatic Android application analysis system. Retrieved from http://sanddroid.xjtu.edu.cn/.
    [9]
    Yousra Aafer, Wenliang Du, and Heng Yin. 2013. Droidapiminer: Mining api-level features for robust malware detection in android. In Proceedings of the 9th International Conference on Security and Privacy in Communication Systems (SecureComm’13).
    [10]
    Joey Allen, Matthew Landen, Sanya Chaba, Yang Ji, Simon Pak Ho Chung, and Wenke Lee. 2018. Improving accuracy of android malware detection with lightweight contextual awareness. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC’18).
    [11]
    Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, and Yves Le Traon. 2016. Androzoo: Collecting millions of android apps for the research community. In Proceedings of the 13th Working Conference on Mining Software Repositories (MSR’16).
    [12]
    Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. Drebin: Effective and explainable detection of android malware in your pocket. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS’14).
    [13]
    Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, and David Lie. 2012. Pscout: Analyzing the Android permission specification. In Proceedings of the ACM Conference on Computer and Communications Security (CCS’12).
    [14]
    Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, and Eric Bodden. 2015. Mining apps for abnormal usage of sensitive data. In Proceedings of the 37th International Conference on Software Engineering (ICSE’15).
    [15]
    Kai Chen, Peng Liu, and Yingjun Zhang. 2014. Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In Proceedings of the 36th International Conference on Software Engineering (ICSE’14).
    [16]
    Kai Chen, Peng Wang, Yeonjoon Lee, XiaoFeng Wang, Nan Zhang, Heqing Huang, Wei Zou, and Peng Liu. 2015. Finding unknown malice in 10 seconds: Mass vetting for new threats at the google-play scale. In Proceedings of the 24th USENIX Security Symposium (USENIX Security’15).
    [17]
    Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, and Kui Ren. 2018. Android HIV: A study of repackaging malware for evading machine-learning detection. IEEE Trans. Info. Forens. Secur. (2018).
    [18]
    Nigel Coles. 2001. It’s not what you know-It’s who you know that counts. Analysing serious crime groups as social networks. Brit. J. Criminol. (2001).
    [19]
    Anthony Desnos et al. 2011. Androguard. Retrieved from https://github.com/androguard/androguard.
    [20]
    William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2014. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (2014).
    [21]
    Ming Fan, Xiapu Luo, Jun Liu, Chunyin Nong, Qinghua Zheng, and Ting Liu. 2019. CTDroid: Leveraging a corpus of technical blogs for android malware analysis. IEEE Trans. Reliabil. (2019).
    [22]
    Katherine Faust. 1997. Centrality in affiliation networks. Soc. Netw. (1997).
    [23]
    Ruitao Feng, Sen Chen, Xiaofei Xie, Lei Ma, Guozhu Meng, Yang Liu, and Shang-Wei Lin. 2019. Mobidroid: A performance-sensitive malware detection system on mobile platform. In Proceedings of the 24th International Conference on Engineering of Complex Computer Systems (ICECCS’19).
    [24]
    Yu Feng, Saswat Anand, Isil Dillig, and Alex Aiken. 2014. Apposcopy: Semantics-based detection of android malware through static analysis. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE’14).
    [25]
    Yu Feng, Osbert Bastani, Ruben Martins, Isil Dillig, and Saswat Anand. 2016. Automated synthesis of semantic malware signatures using maximum satisfiability. Retrieved from https://arXiv:1608.06254.
    [26]
    Linton C. Freeman. 1978. Centrality in social networks conceptual clarification. Soc. Netw. (1978).
    [27]
    Joshua Garcia, Mahmoud Hammad, and Sam Malek. 2018. Lightweight, obfuscation-resilient detection and family identification of Android malware. ACM Trans. Softw. Eng. Methodol. (2018).
    [28]
    Hugo Gascon, Fabian Yamaguchi, Daniel Arp, and Konrad Rieck. 2013. Structural detection of android malware using embedded call graphs. In Proceedings of the ACM Workshop on Artificial Intelligence and Security (WAIS’13).
    [29]
    Michael C. Grace, Yajin Zhou, Zhi Wang, and Xuxian Jiang. 2012. Systematic detection of capability leaks in stock android smartphones. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS’12).
    [30]
    Roger Guimera, Stefano Mossa, Adrian Turtschi, and L. A. Nunes Amaral. 2005. The worldwide air transportation network: Anomalous centrality, community structure, and cities’ global roles. Proc. Natl. Acad. Sci. U.S.A. (2005).
    [31]
    Chun-Ying Huang, Yi-Ting Tsai, and Chung-Han Hsu. 2013. Performance evaluation on permission-based detection for android malware. In Advances in Intelligent Systems and Applications.
    [32]
    Heqing Huang, Sencun Zhu, Peng Liu, and Dinghao Wu. 2013. A framework for evaluating mobile app repackaging detection algorithms. In Proceedings of the 2013 International Conference on Trust and Trustworthy Computing (ICTTC’13).
    [33]
    Médéric Hurier, Guillermo Suarez-Tangil, Santanu Kumar Dash, Tegawendé F. Bissyandé, Yves Le Traon, Jacques Klein, and Lorenzo Cavallaro. 2017. Euphony: Harmonious unification of cacophonous anti-virus vendor labels for Android malware. In Proceedings of the 14th International Conference on Mining Software Repositories (MSR’17).
    [34]
    Hawoong Jeong, Sean P. Mason, A.-L. Barabási, and Zoltan N. Oltvai. 2001. Lethality and centrality in protein networks. Nature (2001).
    [35]
    Leo Katz. 1953. A new status index derived from sociometric analysis. Psychometrika (1953).
    [36]
    Jin Li, Lichao Sun, Qiben Yan, Zhiqiang Li, Witawas Srisa-an, and Heng Ye. 2018. Significant permission identification for machine-learning-based android malware detection. IEEE Trans. Industr. Info. (2018).
    [37]
    Li Li, Tegawendé F. Bissyandé, Damien Octeau, and Jacques Klein. 2016. Droidra: Taming reflection to support whole-program analysis of android apps. In Proceedings of the 25th International Symposium on Software Testing and Analysis (ISSTA’16).
    [38]
    Martina Lindorfer, Matthias Neugschwandtner, Lukas Weichselbaum, Yanick Fratantonio, Victor Van Der Veen, and Christian Platzer. 2014. Andrubis--1,000,000 apps later: A view on current Android malware behaviors. In Proceedings of the International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS’14).
    [39]
    Xiaoming Liu, Johan Bollen, Michael L. Nelson, and Herbert Van de Sompel. 2005. Co-authorship networks in the digital library research community. Info. Process. Manage. (2005).
    [40]
    Aravind Machiry, Nilo Redini, Eric Gustafson, Yanick Fratantonio, Yung Ryn Choe, Christopher Kruegel, and Giovanni Vigna. 2018. Using loops for malware classification resilient to feature-unaware perturbations. In Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC’18).
    [41]
    Henry B. Mann and Donald R. Whitney. 1947. On a test of whether one of two random variables is stochastically larger than the other. Ann. Math. Stat. (1947).
    [42]
    Massimo Marchiori and Vito Latora. 2000. Harmony in the small-world. Physica A: Stat. Mech. Appl. (2000).
    [43]
    Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, and Gianluca Stringhini. 2017. MAMADROID: Detecting android malware by building markov chains of behavioral models. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS’17).
    [44]
    Guozhu Meng, Yinxing Xue, Zhengzi Xu, Yang Liu, Jie Zhang, and Annamalai Narayanan. 2016. Semantic modelling of android malware for effective malware comprehension, detection, and classification. In Proceedings of the 25th International Symposium on Software Testing and Analysis (ISSTA’16).
    [45]
    Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, and Yang Liu. 2018. A multi-view context-aware approach to Android malware detection and malicious code localization. Empir. Softw. Eng. (2018).
    [46]
    Hao Peng, Chris Gates, Bhaskar Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, and Ian Molloy. 2012. Using probabilistic generative models for ranking risks of android apps. In Proceedings of the ACM Conference on Computer and communications security (CCS’12).
    [47]
    Vaibhav Rastogi, Yan Chen, and Xuxian Jiang. 2013. Catch me if you can: Evaluating android anti-malware against transformation attacks. IEEE Trans. Info. Forensics Secur. (2013).
    [48]
    Christian Rossow, Christian J. Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, and Maarten Van Steen. 2012. Prudent practices for designing malware experiments: Status quo and outlook. In Proceedings of the IEEE Symposium on Security and Privacy (S&P’’12).
    [49]
    Andrea Saracino, Daniele Sgandurra, Gianluca Dini, and Fabio Martinelli. 2018. Madam: Effective and efficient behavior-based android malware detection and prevention. IEEE Trans. Depend. Secure Comput. (2018).
    [50]
    Bhaskar Pratim Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru, and Ian Molloy. 2012. Android permissions: A perspective combining risks and benefits. In Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (ACMT’12).
    [51]
    Samuel Sanford Shapiro and Martin B. Wilk. 1965. An analysis of variance test for normality (complete samples). Biometrika (1965).
    [52]
    Guillermo Suarez-Tangil and Gianluca Stringhini. 2018. Eight years of rider measurement in the android malware ecosystem: Evolution and lessons learned. Retrieved from https://arXiv:1801.08115.
    [53]
    Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang. 2014. Exploring permission-induced risk in android applications for malicious application detection. IEEE Trans. Info. Forens. Secur. (2014).
    [54]
    Yueming Wu, Xiaodi Li, Deqing Zou, Wei Yang, Xin Zhang, and Hai Jin. 2019. MalScan: Fast market-wide mobile malware scanning by social-network centrality analysis. In Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE’19).
    [55]
    Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, and Dinghao Wu. 2017. Adaptive unpacking of Android apps. In Proceedings of the International Conference on Software Engineering (ICSE’17).
    [56]
    Wei Yang, Mukul Prasad, and Tao Xie. 2018. Enmobile: Entity-based characterization and analysis of mobile malware. In Proceedings of the 40th International Conference on Software Engineering (ICSE’18).
    [57]
    Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, and William Enck. 2015. Appcontext: Differentiating malicious and benign mobile app behaviors using context. In Proceedings of the 37th International Conference on Software Engineering (ICSE’15).
    [58]
    Mu Zhang, Yue Duan, Heng Yin, and Zhiruo Zhao. 2014. Semantics-aware android malware classification using weighted contextual api dependency graphs. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS’14).
    [59]
    Yueqian Zhang, Xiapu Luo, and Haoyang Yin. 2015. Dexhunter: Toward extracting hidden code from packed android applications. In Proceedings of the European Symposium on Research in Computer Security (ESORICS’15).
    [60]
    Yajin Zhou, Zhi Wang, Wu Zhou, and Xuxian Jiang. 2012. Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS’12).

    Cited By

    View all
    • (2024)An Empirical Study on Android Malware Characterization by Social Network AnalysisIEEE Transactions on Reliability10.1109/TR.2023.330438973:1(757-770)Online publication date: Mar-2024
    • (2024)Android Malware Detection Method Based on CNN and DNN Bybrid MechanismIEEE Transactions on Industrial Informatics10.1109/TII.2024.336301620:5(7744-7753)Online publication date: May-2024
    • (2024)PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detectionScientific Reports10.1038/s41598-024-60982-y14:1Online publication date: 10-May-2024
    • Show More Cited By

    Index Terms

    1. IntDroid: Android Malware Detection Based on API Intimacy Analysis

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Software Engineering and Methodology
      ACM Transactions on Software Engineering and Methodology  Volume 30, Issue 3
      Continuous Special Section: AI and SE
      July 2021
      600 pages
      ISSN:1049-331X
      EISSN:1557-7392
      DOI:10.1145/3450566
      • Editor:
      • Mauro Pezzè
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 May 2021
      Accepted: 01 December 2020
      Revised: 01 December 2020
      Received: 01 February 2020
      Published in TOSEM Volume 30, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. API intimacy
      2. Android malware
      3. centrality
      4. social network

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • the Key Program of National Science Foundation of China
      • the Key-Area Research and Development Program of Guangdong Province
      • the Shenzhen Fundamental Research Program

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)138
      • Downloads (Last 6 weeks)13

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)An Empirical Study on Android Malware Characterization by Social Network AnalysisIEEE Transactions on Reliability10.1109/TR.2023.330438973:1(757-770)Online publication date: Mar-2024
      • (2024)Android Malware Detection Method Based on CNN and DNN Bybrid MechanismIEEE Transactions on Industrial Informatics10.1109/TII.2024.336301620:5(7744-7753)Online publication date: May-2024
      • (2024)PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detectionScientific Reports10.1038/s41598-024-60982-y14:1Online publication date: 10-May-2024
      • (2024)An efficient security testing for android application based on behavior and activities using RFE-MLP and ensemble classifierMultimedia Tools and Applications10.1007/s11042-024-19517-wOnline publication date: 20-Jun-2024
      • (2023)Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and ExplanationProceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3611643.3616358(1611-1622)Online publication date: 30-Nov-2023
      • (2023)VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph ConvolutionACM Transactions on Privacy and Security10.1145/358538626:3(1-25)Online publication date: 14-Apr-2023
      • (2023)MDHE: A Malware Detection System Based on Trust Hybrid User-Edge Evaluation in IoT NetworkIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.331894718(5950-5963)Online publication date: 1-Jan-2023
      • (2023)RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks2023 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)10.1109/SANER56733.2023.00065(639-650)Online publication date: Mar-2023
      • (2023)Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code ComprehensionProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00164(1933-1945)Online publication date: 14-May-2023
      • (2023)Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence ModelsProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00015(30-42)Online publication date: 14-May-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media