skip to main content
10.1145/2799979.2801037acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Hartley's test ranked opcodes for Android malware analysis

Authors Info & Claims
Published:08 September 2015Publication History

ABSTRACT

The popularity and openness of Android platform encourage malware authors to penetrate various market places with malicious applications. As a result, malware detection has become a critical topic in security. Currently signature-based system is able to detect malware only if it is properly documented. This reveals the need to find new malware detection techniques. In our framework, a statistical technique for Android malware detection using opcodes extracted from various applications is proposed. This technique is evaluated against malware apk samples from contagio dataset and benign apk samples from various markets. The prominent features that result in reduced misclassification rates are determined using Hartley's test.

References

  1. dex2jar. http://androidorigin.blogspot.in/2011/02/dex-format-to-jar-format.html. {Online; accessed 29-Jan-2015}.Google ScholarGoogle Scholar
  2. F-max table. https://home.comcast.net/~sharov/PopEcol/tables/f005.html. {Online; accessed 28-Feb-2015}.Google ScholarGoogle Scholar
  3. Drebin dataset. http://user.informatik.uni-goettingen.de/~darp/drebin/download.html. {Online; accessed 12-March-2015}.Google ScholarGoogle Scholar
  4. javap - The Java Class File Disassembler. http://docs.oracle.com/javase/7/docs/technotes/javap.html. {Online; accessed 2-Feb-2015}.Google ScholarGoogle Scholar
  5. Y. Aafer, W. Du, and H. Yin. Droidapiminer: Mining api-level features for robust malware detection in android. In T. A. Zia, A. Y. Zomaya, V. Varadharajan, and Z. M. Mao, editors, SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pages 86--103. Springer, 2013.Google ScholarGoogle Scholar
  6. D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck. Drebin: Effective and explainable detection of android malware in your pocket. In NDSS. The Internet Society, 2014.Google ScholarGoogle Scholar
  7. I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani. Crowdroid: behavior-based malware detection system for android. In X. Jiang, A. Bhattacharya, P. Dasgupta, and W. Enck, editors, SPSM@CCS, pages 15--26. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst., 32(2):5, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W. Enck, M. Ongtang, and P. D. McDaniel. On lightweight mobile phone application certification. In E. Al-Shaer, S. Jha, and A. D. Keromytis, editors, ACM Conference on Computer and Communications Security, pages 235--245. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner. Android permissions demystified. In Y. Chen, G. Danezis, and V. Shmatikov, editors, ACM Conference on Computer and Communications Security, pages 627--638. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y. Freund and R. E. Schapire. Experiments with a new boosting algorithm. In International Conference on Machine Learning, pages 148--156, 1996.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Gianazza, F. Maggi, A. Fattori, L. Cavallaro, and S. Zanero. Puppetdroid: A user-centric ui exerciser for automatic dynamic analysis of similar android applications. CoRR, abs/1402.4826, 2014.Google ScholarGoogle Scholar
  13. M. C. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang. Riskranker: scalable and accurate zero-day android malware detection. In N. Davies, S. Seshan, and L. Zhong, editors, MobiSys, pages 281--294. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: an update. SIGKDD Explor. Newsl., 11(1): 10--18, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. M. H. K. K. Hyunjae Kang, Jae-wook Jang. Detecting and classifying android malware using static analysis along with creator information. In International Journal of Distributed Sensor Networks, Hindawi, 2015.Google ScholarGoogle Scholar
  16. D. Kim, J. Kwak, and J. Ryou. Dwroiddump: Executable code extraction from android applications for malware analysis. 2015.Google ScholarGoogle Scholar
  17. L. S. N. L. Lei Cen, CHRIS Gates. A probabilistic discriminant model for android malware detection with decompiled code. In Dependable and Secure Computing. IEEE, 2013.Google ScholarGoogle Scholar
  18. A. Liaw and M. Wiener. Classification and Regression by randomForest. R News, 2(3): 18--22, 2002.Google ScholarGoogle Scholar
  19. R. T. Llamas. Worldwide Smartphone 2015--2019 Forecast and Analysis. http://www.idc.com/getdoc.jsp?containerId=254912. {Online; accessed 01-May-2015}.Google ScholarGoogle Scholar
  20. Contagio Dump. http://contagiodump.blogspot.in/2011/03/take-sample-leave-sample-mobile-malware.html, 2011. {Online; accessed 20-Jan-2015}.Google ScholarGoogle Scholar
  21. R. L. Ott and M. Longnecker. An Introduction to Statistical Methods and Data Analysis. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. H. Peng, C. S. Gates, B. P. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using probabilistic generative models for ranking risks of android apps. In T. Yu, G. Danezis, and V. D. Gligor, editors, ACM Conference on Computer and Communications Security, pages 241--252. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. P. Refaeilzadeh, L. Tang, and H. Liu. Cross-validation. In L. Liu and M. T. Ozsu, editors, Encyclopedia of Database Systems, pages 532--538. Springer US, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  24. J. J. Rodrïguez, L. I. Kuncheva, and C. J. Alonso. Rotation forest: A new classifier ensemble method. IEEE Trans. Pattern Anal. Mach. Intell., 28(10): 1619--1630, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss. Andromaly: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst., 38(1): 161--190, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. Tam, S. J. Khan, A. Fattori, and L. Cavallaro. Copperdroid: Automatic reconstruction of android malware behaviors. In NDSS. The Internet Society, 2015.Google ScholarGoogle Scholar
  27. D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu. Droidmat: Android malware detection through manifest and api calls tracing. In AsiaJCIS, pages 62--69. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in third-party android marketplaces. In E. Bertino and R. S. Sandhu, editors, CODASPY, pages 317--326. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Hartley's test ranked opcodes for Android malware analysis

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks
        September 2015
        350 pages
        ISBN:9781450334532
        DOI:10.1145/2799979

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 8 September 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SIN '15 Paper Acceptance Rate34of92submissions,37%Overall Acceptance Rate102of289submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader