Title :
Using opcode-sequences to detect malicious Android applications
Author :
Jerome, Quentin ; Allix, Kevin ; State, Radu ; Engel, Thomas
Author_Institution :
Interdiscipl. Center for Security Reliability & Trust, Univ. of Luxembourg, Luxembourg, Luxembourg
Abstract :
Recently, the Android platform has seen its number of malicious applications increased sharply. Motivated by the easy application submission process and the number of alternative market places for distributing Android applications, rogue authors are developing constantly new malicious programs. While current anti-virus software mainly relies on signature detection, the issue of alternative malware detection has to be addressed. In this paper, we present a feature based detection mechanism relying on opcode-sequences combined with machine learning techniques. We assess our tool on both a reference dataset known as Genome Project as well as on a wider sample of 40,000 applications retrieved from the Google Play Store.
Keywords :
Android (operating system); digital signatures; invasive software; learning (artificial intelligence); Genome project; Google play store; anti-virus software; application submission process; feature based detection mechanism; machine learning techniques; malicious Android application detection; malicious programs; malware detection; opcode-sequences; reference dataset; signature detection; Androids; Feature extraction; Google; Humanoid robots; Malware; Software; Android malware; machine learning; opcode-sequences;
Conference_Titel :
Communications (ICC), 2014 IEEE International Conference on
Conference_Location :
Sydney, NSW
DOI :
10.1109/ICC.2014.6883436