4.6 Article

Android Malware Detection Based on Structural Features of the Function Call Graph

Journal

ELECTRONICS
Volume 10, Issue 2, Pages -

Publisher

MDPI
DOI: 10.3390/electronics10020186

Keywords

Android; malware detection; function call graph; graph convolutional network

Funding

  1. National Key Research and Development Program of China [2018YFB0803603, 2016YFB050190104]
  2. National Natural Science Foundation of China [61972040]
  3. Premium Funding Project for Academic Human Resources Development in Beijing Union University [BPHR2020AZ03]

Ask authors/readers for more resources

The openness of the Android operating system brings convenience to users but also poses a threat of attack from malicious applications, making malware detection a key research focus in mobile security. The DGCNDroid method proposed in this paper effectively addresses the issues of feature selection and feature loss in graph structures in current malware detection methods, achieving higher detection accuracy through experimentation on a dataset of 11,120 Android apps.
The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available