4.7 Article Proceedings Paper

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIFS.2018.2806891

Keywords

Android malware; frequent subgraph; familial classification

Funding

  1. National Key Research and Development Program of China [2016YFB1000903]
  2. National Science Foundation of China [61632015, 61772408, U1766215, 61672419, 61702414, 61721002, 61428206, 61472318, 61532004, 61532015, 61602369]
  3. Project of China Knowledge Centre for Engineering Science and Technology
  4. Fok Ying-Tong Education Foundation [151067]
  5. Ministry of Education Innovation Research Team [IRT17R86]
  6. Fundamental Research Funds for the Central Universities
  7. Hong Kong GRF [PolyU 5389/13E, 152279/16E]
  8. Hong Kong RGC [CityU C1008-16G]
  9. HKPolyU Research Grants under Grant G-YBJX
  10. Shenzhen City Science and Technology RD Fund [JCYJ20150630115257892]
  11. National Key R&D Program of China [2016QY04W0805, NSFC U1536106, 61728209]
  12. National Top-notch Youth Talents Program of China, Youth Innovation Promotion Association CAS
  13. Beijing Nova Program
  14. Ant Financial

Ask authors/readers for more resources

The rapid increase in the number of Android malware poses great challenges to anti-malware systems, because the sheer number of malware samples overwhelms malware analysis systems. The classification of malware samples into families, such that the common features shared by malware samples in the same family can be exploited in malware detection and inspection, is a promising approach for accelerating malware analysis. Furthermore, the selection of representative malware samples in each family can drastically decrease the number of malware to be analyzed. However, the existing classification solutions are limited because of the following reasons. First, the legitimate part of the malware may misguide the classification algorithms because the majority of Android malware are constructed by inserting malicious components into popular apps. Second, the polymorphic variants of Android malware can evade detection by employing transformation attacks. In this paper, we propose a novel approach that constructs frequent subgraphs (fregraphs) to represent the common behaviors of malware samples that belong to the same family. Moreover, we propose and develop FalDroid, a novel system that automatically classifies Android malware and selects representative malware samples in accordance with fregraphs. We apply it to 8407 malware samples from 36 families. Experimental results show that FalDroid can correctly classify 94.2% of malware samples into their families using approximately 4.6 sec per app. FalDroid can also dramatically reduce the cost of malware investigation by selecting only 8.5% to 22% representative samples that exhibit the most common malicious behavior among all samples.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Theory & Methods

Toward Automatically Generating Privacy Policy for Android Apps

Le Yu, Tao Zhang, Xiapu Luo, Lei Xue, Henry Chang

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Software Engineering

Enhancing the Description-to-Behavior Fidelity in Android Apps with Privacy Policy

Le Yu, Xiapu Luo, Chenxiong Qian, Shuai Wang, Hareton K. N. Leung

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2018)

Article Computer Science, Software Engineering

System-level attacks against android by exploiting asynchronous programming

Ting Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang

SOFTWARE QUALITY JOURNAL (2018)

Article Engineering, Electrical & Electronic

A Survey on Access Control in Fog Computing

Peng Zhang, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak, Man Ho Au, Xiapu Luo

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Artificial Intelligence

Camera Placement Based on Vehicle Traffic for Better City Security Surveillance

Xiaobo Ma, Yihui He, Xiapu Luo, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan

IEEE INTELLIGENT SYSTEMS (2018)

Article Computer Science, Theory & Methods

LinkScope: Toward Detecting Target Link Flooding Attacks

Lei Xue, Xiaobo Ma, Xiapu Luo, Edmond W. W. Chan, Tony T. N. Miu, Guofei Gu

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

SkyShield: A Sketch-Based Defense System Against Application Layer DDoS Attacks

Chenxu Wang, Tony T. N. Miu, Xiapu Luo, Jinhe Wang

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Proceedings Paper Computer Science, Software Engineering

Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART

Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, Guofei Gu

PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Characterizing the Impacts of Application Layer DDoS Attacks

Muhui Jiang, Chenxu Wang, Xiapu Luo, MiuTung Miu, Ting Chen

2017 IEEE 24TH INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS 2017) (2017)

Proceedings Paper Computer Science, Software Engineering

Adaptive Unpacking of Android Apps

Lei Xue, Xiapu Luo, Le Yu, Shuai Wang, Dinghao Wu

2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

AutoFlowLeaker: Circumventing Web Censorship through Automation Services

Shengtuo Hu, Xiaobo Ma, Muhui Jiang, Xiapu Luo, Man Ho Au

2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS) (2017)

Proceedings Paper Computer Science, Software Engineering

Bug Report Enrichment with Application of Automated Fixer Recommendation

Tao Zhang, Jiachi Chen, He Jiang, Xiapu Luo, Xin Xia

2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC) (2017)

Proceedings Paper Computer Science, Software Engineering

Cloud-Based Parallel Concolic Execution

Ting Chen, Youzheng Feng, Xiapu Luo, Xiaodong Lin, Xiaosong Zhang

2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER) (2017)

Proceedings Paper Computer Science, Software Engineering

Under-Optimized Smart Contracts Devour Your Money

Ting Chen, Xiaoqi Li, Xiapu Luo, Xiaosong Zhang

2017 IEEE 24TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER) (2017)

No Data Available