Visible to the public AMDroid: Android Malware Detection Using Function Call Graphs

TitleAMDroid: Android Malware Detection Using Function Call Graphs
Publication TypeConference Paper
Year of Publication2019
AuthorsGe, X., Pan, Y., Fan, Y., Fang, C.
Conference Name2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C)
Date PublishedJuly 2019
PublisherIEEE
ISBN Number78-1-7281-3925-8
KeywordsAMDroid, Android (operating system), Android Malware Detection, API calls, application program interfaces, countless malicious applications, FCGs, feature extraction, function call graph, function call graphs, graph kernels, graph theory, Human Behavior, invasive software, Kernel, learning (artificial intelligence), machine learning, Malware, malware analysis, Metrics, mobile internet, mobile operating system, opcode sequences, privacy, pubcrawl, resilience, Resiliency, Semantics, smart phones, static analysis, structural semantic learning
Abstract

With the rapid development of the mobile Internet, Android has been the most popular mobile operating system. Due to the open nature of Android, c countless malicious applications are hidden in a large number of benign applications, which pose great threats to users. Most previous malware detection approaches mainly rely on features such as permissions, API calls, and opcode sequences. However, these approaches fail to capture structural semantics of applications. In this paper, we propose AMDroid that leverages function call graphs (FCGs) representing the behaviors of applications and applies graph kernels to automatically learn the structural semantics of applications from FCGs. We evaluate AMDroid on the Genome Project, and the experimental results show that AMDroid is effective to detect Android malware with 97.49% detection accuracy.

URLhttps://ieeexplore.ieee.org/document/8859412
DOI10.1109/QRS-C.2019.00027
Citation Keyge_amdroid_2019