4.4 Article

AmandaSystem: A new framework for static and dynamic Android malware analysis

Journal

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
Volume 43, Issue 5, Pages 6575-6589

Publisher

IOS PRESS
DOI: 10.3233/JIFS-220567

Keywords

Cybersecurity; android malware analysis; static analysis; dynamic analysis; least privilege

Funding

  1. National Natural Science Foundation of China [62166041]

Ask authors/readers for more resources

The focus of research on malware detection is on proposing and improving neural network structures. The constant updates of Android pose challenges to the proposed detection methods. This article proposes an automated platform called AmandaSystem that optimizes each process of existing malware detection methods and achieves efficient feature extraction on large malware datasets. Additionally, a new static analysis method named PerApTool is proposed to accurately map relationships between Android permissions and API calls. Tests conducted on publicly available malware datasets demonstrate the performance of AmandaSystem compared with existing methods in terms of efficiency, space occupancy, and feature extraction.
The focus of a large amount of research on malware detection is currently working on proposing and improving neural network structures, but with the constant updates of Android, the proposed detection methods are more like a race against time. Through the analysis of these methods, we found that the basic processes of these detection methods are roughly the same, and these methods rely on professional reverse engineering tools for malware analysis and feature extraction. These tools generally have problems such as high time-space cost consumption, difficulty in achieving concurrent analysis of a large number of Apk, and the output results are not convenient for feature extraction. Is it possible to propose a general malware detection process implementation platform that optimizes each process of existing malware detection methods while being able to efficiently extract various features on malware datasets with a large number of APK? To solve this problem, we propose an automated platform, AmandaSystem, that highly integrates the various processes of deep learning-based malware detection methods. At the same time, the problem of over privilege due to the openness of Android system and thus the problem of excessive privileges has always required the accurate construction of mapping relationships between privileges and API calls, while the current methods based on function call graphs suffer from inefficiency and low accuracy. To solve this problem, we propose a new bottom-up static analysis method based on AmandaSystem to achieve an efficient and complete tool for mapping relationships between Android permissions and API calls, PerApTool. Finally, we conducted tests on three publicly available malware datasets, CICMalAnal2017, CIC-AAGM2017, and CICInvesAndMal2019, to evaluate the performance of AmandaSystem in terms of time efficiency of APK parsing, space occupancy, and comprehensiveness of extracted features, respectively, compared with existing methods were compared.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available