DocumentCode :
1799768
Title :
Attack Tree Based Android Malware Detection with Hybrid Analysis
Author :
Shuai Zhao ; Xiaohong Li ; Guangquan Xu ; Lei Zhang ; Zhiyong Feng
Author_Institution :
Tianjin Key Lab. of Cognitive Comput. & Applic., Tianjin Univ., Tianjin, China
fYear :
2014
fDate :
24-26 Sept. 2014
Firstpage :
380
Lastpage :
387
Abstract :
This paper proposes an Android malware detection approach based on attack tree. Attack tree model is extended to provide a novel way to organize and exploit behavior rules. Connections between attack goals and application capability are represented by an attack tree structure and behavior rules are assigned to every attack path in the attack tree. In this way, fine-grained and comprehensive static capability estimation and dynamic behavior detection can be achieved. This approach employs a hybrid static-dynamic analysis method. Static analysis tags attack tree nodes based on application capability. It filters the obviously benign applications and highlights the potential attacks in suspicious ones. Dynamic analysis selects rules corresponding to the capability and conducts detection according to runtime behaviors. In dynamic analysis, events are simulated to trigger behaviors based on application components, and hence it achieves high code coverage. Finally, in this way, we implement an automatic malware detection prototype system called AM Detector. The experiment result shows that the true positive rate is 88.14% and the false positive rate is as low as 1.80%.
Keywords :
invasive software; smart phones; tree data structures; AMDetector; Android malware detection approach; application capability; attack goals; attack tree structure; behavior rules; comprehensive static capability estimation; fine-grained estimation; hybrid dynamic analysis method; runtime behaviors; Androids; Feature extraction; Humanoid robots; Malware; Privacy; Runtime; Vegetation; Android; attack tree; detection; hybrid analysis; malware;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on
Conference_Location :
Beijing
Type :
conf
DOI :
10.1109/TrustCom.2014.49
Filename :
7011273
Link To Document :
بازگشت