4.7 Article

DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2017.2687880

Keywords

Piggybacked apps; sensitive API; sensitive subgraph; malware detection; static analysis

Funding

  1. National Key Research and Development Program of China [2016YFB1000903]
  2. National Natural Science Foundation of China [91418205, 61472318, 61532015, 61532004, 61672419, 61632015]
  3. Fok Ying-Tong Education Foundation [151067]
  4. Ministry of Education Innovation Research Team [IRT13035]
  5. Fundamental Research Funds for the Central Universities
  6. Shenzhen City Science and Technology Research and Development Fund [JCYJ20150630115257892]

Ask authors/readers for more resources

With the exponential growth of smartphone adoption, malware attacks on smartphones have resulted in serious threats to users, especially those on popular platforms, such as Android. Most Android malware is generated by piggybacking malicious payloads into benign applications (apps), which are called piggybacked apps. In this paper, we propose DAPASA, an approach to detect Android piggybacked apps through sensitive subgraph analysis. Two assumptions are established to reflect the different invocation patterns of sensitive APIs in the injected malicious payloads (rider) of a piggybacked app and in its host app (carrier). With these two assumptions, DAPASA generates a sensitive subgraph (SSG) to profile the most suspicious behavior of an app. Five features are constructed from SSG to depict the invocation patterns. The five features are fed into the machine learning algorithms to detect whether the app is piggybacked or benign. DAPASA is evaluated on a large real-world data set consisting of 2551 piggybacked apps and 44 921 popular benign apps. Extensive evaluation results demonstrate that the proposed approach exhibits an impressive detection performance compared with that of three baseline approaches even with only five numeric features. Furthermore, the proposed approach can complement permission-based approaches and API-based approaches with the combination of our five features from a new perspective of the invocation structure.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available