首页> 外文期刊>IEEE transactions on dependable and secure computing >Detection of Repackaged Android Malware with Code-Heterogeneity Features
【24h】

Detection of Repackaged Android Malware with Code-Heterogeneity Features

机译:用代码异质性功能检测重新包装的Android恶意软件

获取原文
获取原文并翻译 | 示例
           

摘要

During repackaging, malware writers statically inject malcode and modify the control flow to ensure its execution. Repackaged malware is difficult to detect by existing classification techniques, partly because of their behavioral similarities to benign apps. By exploring the app & x0027;s internal different behaviors, we propose a new Android repackaged malware detection technique based on code heterogeneity analysis. Our solution strategically partitions the code structure of an app into multiple dependence-based regions (subsets of the code). Each region is independently classified on its behavioral features. We point out the security challenges and design choices for partitioning code structures at the class and method level graphs, and present a solution based on multiple dependence relations. We have performed experimental evaluation with over 7,542 Android apps. For repackaged malware, our partition-based detection reduces false negatives (i.e., missed detection) by 30-fold, when compared to the non-partition-based approach. Overall, our approach achieves a false negative rate of 0.35 percent and a false positive rate of 2.97 percent.
机译:在重新包装过程中,恶意软件作家静态注入Malcode并修改控制流以确保其执行。重新包装的恶意软件难以通过现有的分类技术来检测,部分原因是他们与良性应用程序的行为相似之处。通过探索应用程序和X0027的内部不同行为,我们提出了一种基于<斜体>代码异质性分析的新的Android重新包装恶意软件检测技术。我们的解决方案策略性地将应用程序的代码结构分区为基于多个依赖性的区域(代码的子集)。每个区域都独立分类在其行为特征上。我们指出了在类和方法级图中分区代码结构的安全挑战和设计选择,并以多依赖关系为基础的解决方案。我们进行了实验评估,具有超过7,542个Android应用程序。对于重新包装的恶意软件,与基于非分区的方法相比,我们基于分区的检测可减少30倍的假阴性(即,错过检测)。总体而言,我们的方法达到假负率0.35%,假阳性率为2.97%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号