Droidminer: Automated mining and characterization of fine-grained malicious behaviors in android applications
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014•Springer
Most existing malicious Android app detection approaches rely on manually selected
detection heuristics, features, and models. In this paper, we describe a new, complementary
system, called DroidMiner, which uses static analysis to automatically mine malicious
program logic from known Android malware, abstracts this logic into a sequence of threat
modalities, and then seeks out these threat modality patterns in other unknown (or newly
published) Android apps. We formalize a two-level behavioral graph representation used to …
detection heuristics, features, and models. In this paper, we describe a new, complementary
system, called DroidMiner, which uses static analysis to automatically mine malicious
program logic from known Android malware, abstracts this logic into a sequence of threat
modalities, and then seeks out these threat modality patterns in other unknown (or newly
published) Android apps. We formalize a two-level behavioral graph representation used to …
Abstract
Most existing malicious Android app detection approaches rely on manually selected detection heuristics, features, and models. In this paper, we describe a new, complementary system, called DroidMiner, which uses static analysis to automatically mine malicious program logic from known Android malware, abstracts this logic into a sequence of threat modalities, and then seeks out these threat modality patterns in other unknown (or newly published) Android apps. We formalize a two-level behavioral graph representation used to capture Android app program logic, and design new techniques to identify and label elements of the graph that capture malicious behavioral patterns (or malicious modalities). After the automatic learning of these malicious behavioral models, DroidMiner can scan a new Android app to (i) determine whether it contains malicious modalities, (ii) diagnose the malware family to which it is most closely associated, (iii) and provide further evidence as to why the app is considered to be malicious by including a concise description of identified malicious behaviors. We evaluate DroidMiner using 2,466 malicious apps, identified from a corpus of over 67,000 third-party market Android apps, plus an additional set of over 10,000 official market Android apps. Using this set of real-world apps, we demonstrate that DroidMiner achieves a 95.3% detection rate, with only a 0.4% false positive rate. We further evaluate DroidMiner’s ability to classify malicious apps under their proper family labels, and measure its label accuracy at 92%.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果