MalPat: Mining Patterns of Malicious and Benign Android Apps Via Permission-Related APIs.

Guanhong Tao,Zibin Zheng,Ziying Guo,Michael R. Lyu
DOI: https://doi.org/10.1109/tr.2017.2778147
IF: 5.883
2018-01-01
IEEE Transactions on Reliability
Abstract:The dramatic rise of Android application (app) marketplaces has significantly gained the success of convenience for mobile users. Consequently, with the advantage of numerous Android apps, Android malware seizes the opportunity to steal privacy-sensitive data by pretending to provide functionalities as benign apps do. To distinguish malware from millions of Android apps, researchers have proposed sophisticated static and dynamic analysis tools to automatically detect and classify malicious apps. Most of these tools, however, rely on manual configuration of lists of features based on permissions, sensitive resources, intents, etc., which are difficult to come by. To address this problem, we study real-world Android apps to mine hidden patterns of malware and are able to extract highly sensitive APIs that are widely used in Android malware. We also implement an automated malware detection system, MalPat, to fight against malware and assist Android app marketplaces to address unknown malicious apps. Comprehensive experiments are conducted on our dataset consisting of 31 185 benign apps and 15 336 malware samples. Experimental results show that MalPat is capable of detecting malware with a high F-1 score (98.24%) comparing with the state-of-the-art approaches.
What problem does this paper attempt to address?