Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3538969.3543816acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open access

Introducing Quantum Computing in Mobile Malware Detection

Published: 23 August 2022 Publication History

Abstract

Mobile malware are increasing their complexity to be able to evade the current detection mechanism by gathering our sensitive and private information. For this reason, an active research field is represented by malware detection, with a great effort in the development of deep learning models starting from a set of malicious and legitimate applications. The recent introduction of quantum computing made possible quantum machine learning i.e., the integration of quantum algorithms within machine learning algorithms. In this paper, we propose a comparison between several deep learning models, by taking into account also a hybrid quantum malware detector. We explore the effectiveness of different architectures for malicious family detection in the Android environment: LeNet, AlexNet, a Convolutional Neural Network model designed by authors, VGG16 and a Hybrid Quantum Convolutional Neural Network i.e., a model where the first layer is a quantum convolution that uses transformations in circuits to simulate the behavior of a quantum computer. Experiments performed on a real-world dataset composed of 8446 Android malicious and legitimate applications allow us to compare the various models, with particular regard to the quantum model concerning the other ones.

References

[1]
Esma Aïmeur, Gilles Brassard, and Sébastien Gambs. 2006. Machine learning in a quantum world. In Conference of the Canadian Society for Computational Studies of Intelligence. Springer, 431–442.
[2]
Nichola R Allgood. 2020. A quantum algorithm to locate unknown hashes for known n-grams within a large malware corpus. Ph. D. Dissertation. University of Maryland, Baltimore County.
[3]
Md Zahangir Alom, Tarek M Taha, Christopher Yakopcic, Stefan Westberg, Paheding Sidike, Mst Shamima Nasrin, Brian C Van Esesn, Abdul A S Awwal, and Vijayan K Asari. 2018. The history began from alexnet: A comprehensive survey on deep learning approaches. arXiv preprint arXiv:1803.01164(2018).
[4]
Javaria Amin, Muhammad Sharif, Nadia Gul, Seifedine Kadry, and Chinmay Chakraborty. 2021. Quantum machine learning architecture for COVID-19 classification based on synthetic data generation using conditional adversarial neural network. Cognitive Computation(2021), 1–12.
[5]
Michael Broughton, Guillaume Verdon, Trevor McCourt, Antonio J Martinez, Jae Hyeon Yoo, Sergei V Isakov, Philip Massey, Ramin Halavati, Murphy Yuezhen Niu, Alexander Zlokapa, 2020. Tensorflow quantum: A software framework for quantum machine learning. arXiv preprint arXiv:2003.02989(2020).
[6]
Alberto Ferrante, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, and Corrado Aaron Visaggio. 2016. Spotting the malicious moment: Characterizing malware behavior using dynamic features. In 2016 11th International Conference on Availability, Reliability and Security (ARES). IEEE, 372–381.
[7]
Ekta Gandotra, Divya Bansal, and Sanjeev Sofat. 2014. Malware analysis and classification: A survey. Journal of Information Security 2014 (2014).
[8]
Giacomo Iadarola, Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Christian Peluso, and Antonella Santone. 2021. A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning. In 2021 International Joint Conference on Neural Networks (IJCNN). IEEE, 1–8.
[9]
Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, and Antonella Santone. 2019. Formal methods for android banking malware analysis and detection. In 2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS). IEEE, 331–336.
[10]
Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, and Antonella Santone. 2020. Evaluating deep learning classification reliability in android malware family detection. In 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE, 255–260.
[11]
Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, and Antonella Santone. 2021. Towards an interpretable deep learning model for mobile malware detection and family identification. Computers & Security 105 (2021), 102198.
[12]
Seth Lloyd, Masoud Mohseni, and Patrick Rebentrost. 2013. Quantum algorithms for supervised and unsupervised machine learning. arXiv preprint arXiv:1307.0411(2013).
[13]
José D Martín-Guerrero and Lucas Lamata. 2022. Quantum Machine Learning: A tutorial. Neurocomputing 470(2022), 457–461.
[14]
Fabio Valerio Massoli, Lucia Vadicamo, Giuseppe Amato, and Fabrizio Falchi. 2021. A Leap among Entanglement and Neural Networks: A Quantum Survey. arXiv preprint arXiv:2107.03313(2021).
[15]
Francesco Mercaldo and Antonella Santone. 2020. Deep learning for image-based mobile malware detection. Journal of Computer Virology and Hacking Techniques 16, 2(2020), 157–171.
[16]
Patrick Rebentrost, Masoud Mohseni, and Seth Lloyd. 2014. Quantum support vector machine for big data classification. Physical review letters 113, 13 (2014), 130503.
[17]
Maria Schuld, Ilya Sinayskiy, and Francesco Petruccione. 2015. An introduction to quantum machine learning. Contemporary Physics 56, 2 (2015), 172–185.
[18]
John J Seymour. 2014. Quantum classification of malware. University of Maryland, Baltimore County.
[19]
Peter W Shor. 1999. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review 41, 2 (1999), 303–332.
[20]
Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556(2014).
[21]
Danish Vasan, Mamoun Alazab, Sobia Wassan, Babak Safaei, and Qin Zheng. 2020. Image-Based malware classification using ensemble of CNN architectures (IMCEC). Computers & Security 92(2020), 101748.
[22]
Haofan Wang, Zifan Wang, Mengnan Du, Fan Yang, Zijian Zhang, Sirui Ding, Piotr Mardziel, and Xia Hu. 2020. Score-CAM: Score-weighted visual explanations for convolutional neural networks. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition workshops. 24–25.
[23]
Nathan Wiebe, Ashish Kapoor, and Krysta M Svore. 2014. Quantum deep learning. arXiv preprint arXiv:1412.3489(2014).
[24]
Ding Yuxin and Zhu Siyi. 2019. Malware detection based on deep learning algorithm. Neural Computing and Applications 31, 2 (2019), 461–472.

Cited By

View all
  • (2024)Quantum Exploration in Ransomware Detection with Conventional Machine Learning Approaches2024 IEEE International Conference on Contemporary Computing and Communications (InC4)10.1109/InC460750.2024.10649082(1-8)Online publication date: 15-Mar-2024
  • (2024)Quantum deep neural networks for time series analysisQuantum Information Processing10.1007/s11128-024-04404-y23:6Online publication date: 24-May-2024
  • (2023)Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep LearningProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605037(1-10)Online publication date: 29-Aug-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security
August 2022
1371 pages
ISBN:9781450396707
DOI:10.1145/3538969
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 August 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Android
  2. deep learning
  3. malware
  4. quantum computing
  5. security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2022

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)590
  • Downloads (Last 6 weeks)72
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Quantum Exploration in Ransomware Detection with Conventional Machine Learning Approaches2024 IEEE International Conference on Contemporary Computing and Communications (InC4)10.1109/InC460750.2024.10649082(1-8)Online publication date: 15-Mar-2024
  • (2024)Quantum deep neural networks for time series analysisQuantum Information Processing10.1007/s11128-024-04404-y23:6Online publication date: 24-May-2024
  • (2023)Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep LearningProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3605037(1-10)Online publication date: 29-Aug-2023
  • (2023)Exploring Quantum Machine Learning for Explainable Malware Detection2023 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN54540.2023.10191964(1-6)Online publication date: 18-Jun-2023
  • (2022)Towards Explainable Quantum Machine Learning for Mobile Malware Detection and ClassificationApplied Sciences10.3390/app12231202512:23(12025)Online publication date: 24-Nov-2022
  • (2022)Continuous and Silent User Authentication Through Mouse Dynamics and Explainable Deep Learning: A Proposal2022 IEEE International Conference on Big Data (Big Data)10.1109/BigData55660.2022.10020235(6628-6630)Online publication date: 17-Dec-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media