Title
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features
Abstract
While mobile devices have become more pervasive every day, the interest in them from attackers has also been increasing, making effective malware detection tools of ultimate importance for malware investigation and user protection. Most informative malware identification techniques are the ones that are able to identify where the malicious behavior is located in applications. In this way, better understanding of malware can be achieved and effective tools for its detection can be written. However, due to complexity of such a task, most of the current approaches just classify applications as malicious or benign, without giving any further insights. In this work, we propose a technique for automatic analysis of mobile applications which allows its users to automatically identify the sub-sequences of execution traces where malicious activity happens, hence making further manual analysis and understanding of malware easier. Our technique is based on dynamic features concerning resources usage and system calls, which are jointly collected while the application is executed. An execution trace is then split in shorter chunks that are analyzed with machine learning techniques to detect local malicious behaviors. Obtained results on the analysis of 3,232 Android applications show that collected features contain enough information to identify suspicious execution traces that should be further analysed and investigated.
Year
DOI
Venue
2016
10.1109/ARES.2016.70
2016 11th International Conference on Availability, Reliability and Security (ARES)
Keywords
Field
DocType
malware behavior characterization,dynamic features,mobile devices,malware detection tools,user protection,informative malware identification,automatic mobile application analysis,malicious activity,resource usage,system calls,machine learning,local malicious behavior detection,Android applications
Cryptovirology,Android (operating system),Computer security,Computer science,Mobile device,Malware,User protection,Spotting
Conference
ISBN
Citations 
PageRank 
978-1-5090-0991-6
2
0.38
References 
Authors
0
5
Name
Order
Citations
PageRank
Alberto Ferrante17813.68
Eric Medvet228838.94
Francesco Mercaldo331950.25
Jelena Milosevic4184.79
Corrado Aaron Visaggio561945.84