恶意软件
计算机科学
Android(操作系统)
静态分析
恶意软件分析
移动恶意软件
支持向量机
软件
资源消耗
机器学习
数据挖掘
计算机安全
人工智能
操作系统
程序设计语言
生物
生态学
作者
Massarelli, Luca,Aniello, Leonardo,Ciccotelli, Claudio,Querzoni, Leonardo,Ucci, Daniele,Baldoni, Roberto
出处
期刊:Cornell University - arXiv
日期:2017-09-04
标识
DOI:10.48550/arxiv.1709.00875
摘要
The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years. An important task of malware analysis is the classification of malware samples into known families. Static malware analysis is known to fall short against techniques that change static characteristics of the malware (e.g. code obfuscation), while dynamic analysis has proven effective against such techniques. To the best of our knowledge, the most notable work on Android malware family classification purely based on dynamic analysis is DroidScribe. With respect to DroidScribe, our approach is easier to reproduce. Our methodology only employs publicly available tools, does not require any modification to the emulated environment or Android OS, and can collect data from physical devices. The latter is a key factor, since modern mobile malware can detect the emulated environment and hide their malicious behavior. Our approach relies on resource consumption metrics available from the proc file system. Features are extracted through detrended fluctuation analysis and correlation. Finally, a SVM is employed to classify malware into families. We provide an experimental evaluation on malware samples from the Drebin dataset, where we obtain a classification accuracy of 82%, proving that our methodology achieves an accuracy comparable to that of DroidScribe. Furthermore, we make the software we developed publicly available, to ease the reproducibility of our results.
科研通智能强力驱动
Strongly Powered by AbleSci AI