Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23353
|View full text |Cite
|
Sign up to set email alerts
|

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models

Abstract: Abstract-The rise in popularity of the Android platform has resulted in an explosion of malware threats targeting it. As both Android malware and the operating system itself constantly evolve, it is very challenging to design robust malware mitigation techniques that can operate for long periods of time without the need for modifications or costly re-training. In this paper, we present MAMADROID, an Android malware detection system that relies on app behavior. MAMADROID builds a behavioral model, in the form o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
265
2
5

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 237 publications
(277 citation statements)
references
References 35 publications
5
265
2
5
Order By: Relevance
“…The Data Analytics platform consists of centralized database servers for analytics and processing. The research will be focused on identifying the classification and anomaly detection machine learning algorithms that includes open source and commercial platforms, libraries with these platforms [17] [18] to detect malware [19] [20] that primarily focus on the Linux data structure extracted by the VMI Framework.…”
Section: Data Analytics and Resultsmentioning
confidence: 99%
“…The Data Analytics platform consists of centralized database servers for analytics and processing. The research will be focused on identifying the classification and anomaly detection machine learning algorithms that includes open source and commercial platforms, libraries with these platforms [17] [18] to detect malware [19] [20] that primarily focus on the Linux data structure extracted by the VMI Framework.…”
Section: Data Analytics and Resultsmentioning
confidence: 99%
“…Classifier In contrast, MaMaDroid [24] shows vulnerability to unbalanced training dataset. In Figure 3b, in the case of using fixed size of malicious apps and a set 1,500 of benign instances in the training phase, we observe that DaDiDroid outperforms MaMaDroid with on average 26% higher accuracy.…”
Section: Datasetmentioning
confidence: 99%
“…By parsing the API names that correspond to a given Android app in Marvin dataset, we determine this type of obfuscation in our datasets. In essence, leveraging previous works [28,24], we define that an API is obfuscated if either at least 50% of its functions or methods are at most 3 characters or if we cannot tell what its class implements, extends or inherits due to identifier mangling [28].…”
Section: Robustness Against Obfuscation Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The sheer number of apps available in current markets, along with the ratio at which new apps are submitted, makes impossible to manually analyze all of them. Automated analyses also have their limitations and some techniques might require a substantial amount of time per app [25]. This has motivated the need for a multi-staged analysis pipeline in which apps should be initially triaged to allocate resources intelligently and guarantee that the analysis effort is devoted to those samples that potentially have more security interest.…”
Section: Introductionmentioning
confidence: 99%