Screening smartphone applications using malware family signatures

نویسندگان

  • Jehyun Lee
  • Suyeon Lee
  • Heejo Lee
چکیده

The sharp increase in smartphone malware has become one of the most serious security problems. Since the Android platform has taken the dominant position in smartphone popularity, the number of Android malware has grown correspondingly and represents critical threat to the smartphone users. This rise in malware is primarily attributable to the occurrence of variants of existing malware. A set of variants stem from one malware can be considered as onemalware family, andmalware families covermore thanhalf of theAndroid malware population. A conventional technique for defeatingmalware is the use of signature matchingwhich is efficient froma timeperspectivebutnot verypractical becauseof its lackof robustness against the malware variants. As a counter approach for handling the issue of variants behavior analysis techniques have been proposed but require extensive time and resources. In this paper, we propose an Android malware detection mechanism that uses automated family signature extraction and family signature matching. Key concept of the mechanism is to extract a set of family representative binary patterns from evaluated family members as a signature and to classify each set of variants into a malware family via an estimation of similarity to the signatures. The proposed family signature and detection mechanism offers more flexible variant detection than does the legacy signature matching, which is strictly dependent on the presence of a specific string. Furthermore, compared with the previous behavior analysis techniques considering family detection, the proposed family signature has higher detection accuracywithout the need for the significant overhead of data and control flowanalysis.Using theproposed signature,we candetect newvariants of known malware efficiently and accurately by static matching. We evaluated our mechanism with 5846 realworldAndroidmalware samplesbelonging to48 families collected inApril 2014 at an anti-virus company; experimental results showedthat; ourmechanismachievedgreater than 97%accuracy indetection of variants.Wealso demonstrated that themechanismhas a linear time complexity with the number of target applications. © 2015 Elsevier Ltd. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Screening Smartphone Applications Using Behavioral Signatures

The sharp increase of smartphone malwares has become one of the most serious security problems. The most significant part of the growth is the variants of existing malwares. A legacy approach for malware, the signature matching, is efficient in temporal dimension, but it is not practical because of its lack of robustness against the variants. A counter approach, the behavior analysis to handle ...

متن کامل

Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability

This paper proposes a technique for automatically learning semantic malware signatures for Android from very few samples of a malware family. The key idea underlying our technique is to look for a maximally suspicious common subgraph (MSCS) that is shared between all known instances of a malware family. An MSCS describes the shared functionality between multiple Android applications in terms of...

متن کامل

MAPPING THE LAWS WHICH APPLY TO INTERCEPTING WIRELESS COMMUNICATIONS IN A WESTERN AUSTRALIAN LEGAL CONTEXT The rapid evolution and deployment of WiFi

The prevalence of Android smartphones and the immense growth of Android malware create significant numbers of malware incidents that require forensics handling. Certain smartphone forensic tool has incorporated anti-virus databases in their device for malware detection process. However, examiners should be aware that most of anti-virus application uses known patterns or signatures for malware d...

متن کامل

Automatically Learning Android Malware Signatures from Few Samples

We propose a new technique for Android malware detection that combines the respective strengths of learningand signature-based approaches. Our approach uses a new learning algorithm based on Maximum Satisfiability (MaxSAT) to automatically synthesize semantic malware signatures from very few instances of a malware family. Our key insight is that the common functionality of a malware family can ...

متن کامل

An MTM based Watchdog for Malware Famishment in Smartphones

Due to their various wireless interfaces, a continuously increasing number of fishy Apps, and due to their raising popularity, smartphones are becoming a promising target for attackers. Independently of the point of entrance, malwares are typically attached to an App to perform their malicious activities. However, malware can only do harm on a smartphone if it is executed. We thus propose a mal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 52  شماره 

صفحات  -

تاریخ انتشار 2015