2018 16th Annual Conference on Privacy, Security and Trust (PST) 2018
DOI: 10.1109/pst.2018.8514191
|View full text |Cite
|
Sign up to set email alerts
|

A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis

Abstract: Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted them, designing and distributing malicious apps that steal information or cause harm to the device's owner. Aiming to counter them, detection techniques based on either static or dynamic analysis that model Android malware, have been proposed. While the pros and cons of these analysis techniques are known, they are usually compared in the context of their limitations e.g., static analysis is not able to capture … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 34 publications
0
24
0
Order By: Relevance
“…Afonso et al [33] and Dash et al [34] detected malware by dynamically obtained features. Meanwhile, some state-of-the-art approaches used dynamic and static methods to obtain features to detect malware [35,36]. The drawbacks of the hybrid approach is that it requires additional OS system consumption and a lot of time.…”
Section: Hybrid Detectionmentioning
confidence: 99%
“…Afonso et al [33] and Dash et al [34] detected malware by dynamically obtained features. Meanwhile, some state-of-the-art approaches used dynamic and static methods to obtain features to detect malware [35,36]. The drawbacks of the hybrid approach is that it requires additional OS system consumption and a lot of time.…”
Section: Hybrid Detectionmentioning
confidence: 99%
“…Early research incorporating traditional ML algorithms included k-means clustering, kNN [35,39], SVM [5,28,50], decision trees [1,7,8,14,47], and naive Bayes [47]. These ML algorithms usually have manually selected or ranked features as input, such as malicious system call traces [6], permissions [34,37], APIs [1,27,32,37,39,50], network addresses [5], network traffic [22,42] and embedded call graphs [15]. However, a reliance on expert knowledge for feature engineering can render a model more vulnerable to change than if the model learns features itself.…”
Section: Related Work 21 Android Malware Detectionmentioning
confidence: 99%
“…From each sample we extract three input feature sets -1) opcode instructions; previously shown to be an effective feature set [30], 2) permissions; which cannot be obfuscated without rendering the app useless, and 3) the presence of a selection of API calls, Android commands and Linux terminal commands [48]. The latter two feature sets provide useful information for Android malware classification [5,28,32,34,50], since a malware detector learning only from opcodes is likely to be cheated easily with obfuscation, especially if such evasive techniques are not considered in the learning process. We point out that these features are simply extracted, and expert malware knowledge is not used to rank or engineer them using statistical methods.…”
Section: Feature Extractionmentioning
confidence: 99%
“…Moreover, according to Vidas and Christin [65], mobile malware authors often employ emulation or virtualization detection strategies to change malware behavior and eventually evade detection. Also related to MaMaDroid is AuntieDroid [50], which applies MaMaDroid's technique in a dynamic analysis setting by modeling the behavior of apps using traces produced from executing the apps in a virtual device.…”
Section: Android Malware Detectionmentioning
confidence: 99%