Author :
Wu, Dong-Jie ; Mao, Ching-Hao ; Wei, Te-En ; Lee, Hahn-Ming ; Wu, Kuo-Ping
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan
Abstract :
Recently, the threat of Android malware is spreading rapidly, especially those repackaged Android malware. Although understanding Android malware using dynamic analysis can provide a comprehensive view, it is still subjected to high cost in environment deployment and manual efforts in investigation. In this study, we propose a static feature-based mechanism to provide a static analyst paradigm for detecting the Android malware. The mechanism considers the static information including permissions, deployment of components, Intent messages passing and API calls for characterizing the Android applications behavior. In order to recognize different intentions of Android malware, different kinds of clustering algorithms can be applied to enhance the malware modeling capability. Besides, we leverage the proposed mechanism and develop a system, called Droid Mat. First, the Droid Mat extracts the information (e.g., requested permissions, Intent messages passing, etc) from each application´s manifest file, and regards components (Activity, Service, Receiver) as entry points drilling down for tracing API Calls related to permissions. Next, it applies K-means algorithm that enhances the malware modeling capability. The number of clusters are decided by Singular Value Decomposition (SVD) method on the low rank approximation. Finally, it uses kNN algorithm to classify the application as benign or malicious. The experiment result shows that the recall rate of our approach is better than one of well-known tool, Androguard, published in Black hat 2011, which focuses on Android malware analysis. In addition, Droid Mat is efficient since it takes only half of time than Androguard to predict 1738 apps as benign apps or Android malware.
Keywords :
application program interfaces; invasive software; message passing; pattern clustering; API calls tracing; Androguard; Android malware analysis; Android malware detection; Black hat 2011; Droid Mat; DroidMat; SVD method; activity; application manifest file; clustering algorithms; component deployment; component permission; dynamic analysis; intent messages passing; k-means algorithm; kNN algorithm; recall rate; receiver; regards components; service; singular value decomposition method; static analyst paradigm; static feature-based mechanism; Androids; Clustering algorithms; Feature extraction; Humanoid robots; Malware; Smart phones; Android malware; Smartphone security; anomaly detection; feature-based; static analysis;