计算机科学
Android(操作系统)
恶意软件
可执行文件
卷积神经网络
联营
Android恶意软件
人工智能
源代码
机器学习
Boosting(机器学习)
操作系统
作者
Huijuan Zhu,Hua-hui Wei,Liangmin Wang,Zhicheng Xu,Victor S. Sheng
标识
DOI:10.1016/j.eswa.2023.119593
摘要
Android has rapidly become the most popular mobile operating system because of its open source, rich hardware selectivity, and millions of applications (Apps). Meanwhile, the open source of Android makes it the main target of malware. Malware detection methods based on manual features are easily bypassed by confusing technologies and are suffering from low code coverage. Thus, we propose an automated extraction method without any manual expert intervention. Specifically, we characterize the vital parts of the Dalvik executable (Dex) to an RGB (Red/Green/Blue) image. Furthermore, we propose a novel convolutional neural network (CNN) variant with diverse receptive fields using max pooling and average pooling simultaneously (MADRF), named MADRF-CNN, which can capture the dependencies between different parts of the image (transferred from the Dex file) by capitalizing on multi-scale context information. To evaluate the effectiveness of the proposed method, we conducted extensive experiments and our experimental results showed that the Accuracy of our method is 96.9%, which is much better than state-of-the-art solutions.
科研通智能强力驱动
Strongly Powered by AbleSci AI