4.4 Article

AmandaSystem: A new framework for static and dynamic Android malware analysis

期刊

JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
卷 43, 期 5, 页码 6575-6589

出版社

IOS PRESS
DOI: 10.3233/JIFS-220567

关键词

Cybersecurity; android malware analysis; static analysis; dynamic analysis; least privilege

资金

  1. National Natural Science Foundation of China [62166041]

向作者/读者索取更多资源

The focus of research on malware detection is on proposing and improving neural network structures. The constant updates of Android pose challenges to the proposed detection methods. This article proposes an automated platform called AmandaSystem that optimizes each process of existing malware detection methods and achieves efficient feature extraction on large malware datasets. Additionally, a new static analysis method named PerApTool is proposed to accurately map relationships between Android permissions and API calls. Tests conducted on publicly available malware datasets demonstrate the performance of AmandaSystem compared with existing methods in terms of efficiency, space occupancy, and feature extraction.
The focus of a large amount of research on malware detection is currently working on proposing and improving neural network structures, but with the constant updates of Android, the proposed detection methods are more like a race against time. Through the analysis of these methods, we found that the basic processes of these detection methods are roughly the same, and these methods rely on professional reverse engineering tools for malware analysis and feature extraction. These tools generally have problems such as high time-space cost consumption, difficulty in achieving concurrent analysis of a large number of Apk, and the output results are not convenient for feature extraction. Is it possible to propose a general malware detection process implementation platform that optimizes each process of existing malware detection methods while being able to efficiently extract various features on malware datasets with a large number of APK? To solve this problem, we propose an automated platform, AmandaSystem, that highly integrates the various processes of deep learning-based malware detection methods. At the same time, the problem of over privilege due to the openness of Android system and thus the problem of excessive privileges has always required the accurate construction of mapping relationships between privileges and API calls, while the current methods based on function call graphs suffer from inefficiency and low accuracy. To solve this problem, we propose a new bottom-up static analysis method based on AmandaSystem to achieve an efficient and complete tool for mapping relationships between Android permissions and API calls, PerApTool. Finally, we conducted tests on three publicly available malware datasets, CICMalAnal2017, CIC-AAGM2017, and CICInvesAndMal2019, to evaluate the performance of AmandaSystem in terms of time efficiency of APK parsing, space occupancy, and comprehensiveness of extracted features, respectively, compared with existing methods were compared.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据