4.7 Article Proceedings Paper

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2018.2806891

Keywords

Android malware; frequent subgraph; familial classification

Funding

  1. National Key Research and Development Program of China [2016YFB1000903]
  2. National Science Foundation of China [61632015, 61772408, U1766215, 61672419, 61702414, 61721002, 61428206, 61472318, 61532004, 61532015, 61602369]
  3. Project of China Knowledge Centre for Engineering Science and Technology
  4. Fok Ying-Tong Education Foundation [151067]
  5. Ministry of Education Innovation Research Team [IRT17R86]
  6. Fundamental Research Funds for the Central Universities
  7. Hong Kong GRF [PolyU 5389/13E, 152279/16E]
  8. Hong Kong RGC [CityU C1008-16G]
  9. HKPolyU Research Grants under Grant G-YBJX
  10. Shenzhen City Science and Technology RD Fund [JCYJ20150630115257892]
  11. National Key R&D Program of China [2016QY04W0805, NSFC U1536106, 61728209]
  12. National Top-notch Youth Talents Program of China, Youth Innovation Promotion Association CAS
  13. Beijing Nova Program
  14. Ant Financial

Ask authors/readers for more resources

The rapid increase in the number of Android malware poses great challenges to anti-malware systems, because the sheer number of malware samples overwhelms malware analysis systems. The classification of malware samples into families, such that the common features shared by malware samples in the same family can be exploited in malware detection and inspection, is a promising approach for accelerating malware analysis. Furthermore, the selection of representative malware samples in each family can drastically decrease the number of malware to be analyzed. However, the existing classification solutions are limited because of the following reasons. First, the legitimate part of the malware may misguide the classification algorithms because the majority of Android malware are constructed by inserting malicious components into popular apps. Second, the polymorphic variants of Android malware can evade detection by employing transformation attacks. In this paper, we propose a novel approach that constructs frequent subgraphs (fregraphs) to represent the common behaviors of malware samples that belong to the same family. Moreover, we propose and develop FalDroid, a novel system that automatically classifies Android malware and selects representative malware samples in accordance with fregraphs. We apply it to 8407 malware samples from 36 families. Experimental results show that FalDroid can correctly classify 94.2% of malware samples into their families using approximately 4.6 sec per app. FalDroid can also dramatically reduce the cost of malware investigation by selecting only 8.5% to 22% representative samples that exhibit the most common malicious behavior among all samples.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available