ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures
Title | ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Karbab, ElMouatez Billah, Debbabi, Mourad |
Conference Name | Proceedings of the 13th International Conference on Availability, Reliability and Security |
Publisher | ACM |
ISBN Number | 978-1-4503-6448-5 |
Keywords | android, Correlation, Cyber-Infrastructure, graph analysis, graph theory, Human Behavior, Malware, malware analysis, Metrics, privacy, pubcrawl, Resiliency |
Abstract | The popularity of Android, not only in handsets but also in IoT devices, makes it a very attractive target for malware threats, which are actually expanding at a significant rate. The state-of-the-art in malware mitigation solutions mainly focuses on the detection of malicious Android apps using dynamic and static analysis features to segregate malicious apps from benign ones. Nevertheless, there is a small coverage for the Internet/network dimension of Android malicious apps. In this paper, we present ToGather, an automatic investigation framework that takes Android malware samples as input and produces insights about the underlying malicious cyber infrastructures. ToGather leverages state-of-the-art graph theory techniques to generate actionable, relevant and granular intelligence to mitigate the threat effects induced by the malicious Internet activity of Android malware apps. We evaluate ToGather on a large dataset of real malware samples from various Android families, and the obtained results are both interesting and promising. |
URL | https://dl.acm.org/citation.cfm?doid=3230833.3230870 |
DOI | 10.1145/3230833.3230870 |
Citation Key | karbab_togather:_2018 |