String-based Malware Detection for Android Environments | SpringerLink
Skip to main content

String-based Malware Detection for Android Environments

  • Conference paper
  • First Online:
Intelligent Distributed Computing X (IDC 2016)

Part of the book series: Studies in Computational Intelligence ((SCI,volume 678))

Included in the following conference series:

Abstract

Android platforms are known as the less security smartphone devices. The increasing number of malicious apps published on Android markets suppose an important threat to users sensitive data, compromising more devices everyday. The commercial solutions that aims to fight against this malware are based on signature methodologies whose detection ratio is low. Furthermore, these engines can be easily defeated by obfuscation techniques, which are extremely common in app plagiarism. This work aims to improve malware detection using only the binary information and the permissions that are normally used by the anti-virus engines, in order to provide a scalable solution based on machine learning. In order to evaluate the performance of this approach, we carry out our experiments using 5000 malware and 5000 benign-ware, and compare the results with 56 Anti-Virus Engines from VirusTotal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 17159
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 21449
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
JPY 21449
Price includes VAT (Japan)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Daniel Arp, Michael Spreitzenbarth, Malte Hübner, Hugo Gascon, Konrad Rieck, and CERT Siemens. Drebin: Effective and explainable detection of android malware in your pocket. In Proceedings of the Annual Symposium on Network and Distributed System Security (NDSS), 2014.

    Google Scholar 

  2. Gema Bello-Orgaz and David Camacho. Evolutionary clustering algorithm for community detection using graph-based information. In Evolutionary Computation (CEC), 2014 IEEE Congress on, pages 930–937. IEEE, 2014.

    Google Scholar 

  3. Gema Bello-Orgaz, Jason J Jung, and David Camacho. Social big data: Recent achievements and new challenges. Information Fusion, 28:45–59, 2016.

    Google Scholar 

  4. Mihai Christodorescu, Somesh Jha, Sanjit Seshia, Dawn Song, Randal E Bryant, et al. Semantics-aware malware detection. In Security and Privacy, 2005 IEEE Symposium on, pages 32–46. IEEE, 2005.

    Google Scholar 

  5. Pedro Domingos and Michael Pazzani. On the optimality of the simple bayesian classifier under zero-one loss. Machine learning, 29(2-3):103–130, 1997.

    Google Scholar 

  6. Marti A. Hearst, Susan T Dumais, Edgar Osman, John Platt, and Bernhard Scholkopf. Support vector machines. Intelligent Systems and their Applications, IEEE, 13(4):18–28, 1998.

    Google Scholar 

  7. Tin Kam Ho. The random subspace method for constructing decision forests. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 20(8):832–844, 1998.

    Google Scholar 

  8. Nwokedi Idika and Aditya P Mathur. A survey of malware detection techniques. Purdue University, 48, 2007.

    Google Scholar 

  9. Takamasa Isohara, Keisuke Takemori, and Ayumu Kubota. Kernel-based behavior analysis for android malware detection. In Computational Intelligence and Security (CIS), 2011 Seventh International Conference on, pages 1011–1015. IEEE, 2011.

    Google Scholar 

  10. Daniel T Larose. Discovering knowledge in data: an introduction to data mining. John Wiley & Sons, 2014.

    Google Scholar 

  11. Hector D Menendez, David F Barrero, and David Camacho. A genetic graphbased approach for partitional clustering. International journal of neural systems, 24(03):1430008, 2014.

    Google Scholar 

  12. Héctor David Menéndez and David Camacho. Mogcla: A multi-objective genetic clustering algorithm for large data analysis. In Proceedings of the Companion Publication of the 2015 on Genetic and Evolutionary Computation Conference, pages 1437–1438. ACM, 2015.

    Google Scholar 

  13. Andreas Moser, Christopher Kruegel, and Engin Kirda. Limits of static analysis for malware detection. In Computer security applications conference, 2007. ACSAC 2007. Twenty-third annual, pages 421–430. IEEE, 2007.

    Google Scholar 

  14. Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray. A semantics-based approach to malware detection. ACM SIGPLAN Notices, 42(1):377–388, 2007.

    Google Scholar 

  15. J Ross Quinlan and Ronald L Rivest. Inferring decision trees using the minimum description lenght principle. Information and computation, 80(3):227–248, 1989.

    Google Scholar 

  16. Víctor Rodríguez-Fernáandez, Héctor D Menéndez, and David Camacho. Automatic profile generation for uav operators using a simulation-based training environment. Progress in Artificial Intelligence, 5(1):37–46, 2016.

    Google Scholar 

  17. Victor Rodriguez-Fernandez, Cristian Ramirez-Atencia, and David Camacho. A multi-uav mission planning videogame-based framework for player analysis. In Evolutionary Computation (CEC), 2015 IEEE Congress on, pages 1490–1497. IEEE, 2015.

    Google Scholar 

  18. Igor Santos, Felix Brezo, Javier Nieves, Yoseba K Penya, Borja Sanz, Carlos Laorden, and Pablo G Bringas. Idea: Opcode-sequence-based malware detection. In Engineering Secure Software and Systems, pages 35–43. Springer, 2010.

    Google Scholar 

  19. Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 38(1):161–190, 2012.

    Google Scholar 

  20. Kimberly Tam, Salahuddin J Khan, Aristide Fattori, and Lorenzo Cavallaro. Copperdroid: Automatic reconstruction of android malware behaviors. In Proc. of the Symposium on Network and Distributed System Security (NDSS), 2015.

    Google Scholar 

  21. Mu Zhang, Yue Duan, Heng Yin, and Zhiruo Zhao. Semantics-aware android malware classification using weighted contextual api dependency graphs. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 1105–1116. ACM, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Héctor D. Menéndez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Martín, A., Menéndez, H.D., Camacho, D. (2017). String-based Malware Detection for Android Environments. In: Badica, C., et al. Intelligent Distributed Computing X. IDC 2016. Studies in Computational Intelligence, vol 678. Springer, Cham. https://doi.org/10.1007/978-3-319-48829-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48829-5_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48828-8

  • Online ISBN: 978-3-319-48829-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics