YANG Jiyun, TANG Jiang, YAN Ran, XIANG Tao. Android Malware Detection Method Based on Permission Complement and API Calls[J]. Chinese Journal of Electronics, 2022, 31(4): 773-785. DOI: 10.1049/cje.2020.00.217
Citation: YANG Jiyun, TANG Jiang, YAN Ran, XIANG Tao. Android Malware Detection Method Based on Permission Complement and API Calls[J]. Chinese Journal of Electronics, 2022, 31(4): 773-785. DOI: 10.1049/cje.2020.00.217

Android Malware Detection Method Based on Permission Complement and API Calls

  • The dynamic code loading mechanism of the Android system allows an application to load executable files externally at runtime. This mechanism makes the development of applications more convenient, but it also brings security issues. Applications that hide malicious behavior in the external file by dynamic code loading are becoming a new challenge for Android malware detection. To overcome this challenge, based on dynamic code loading mechanisms, three types of threat models, i.e. Model I, Model II, and Model III are defined. For the Model I type malware, its malicious behavior occurs in DexCode, so the application programming interface (API) classes were used to characterize the behavior of the DexCode file. For the Model II type and Model III type malwares whose malicious behaviors occur in an external file, the permission complement is defined to characterize the behaviors of the external file. Based on permission complement and API calls, an Android malicious application detection method is proposed, of which feature sets are constructed by improving a feature selection method. Five datasets containing 15,581 samples are used to evaluate the performance of the proposed method. The experimental results show that our detection method achieves accuracy of 99.885% on general dataset, and performes the best on all evaluation metrics on all datasets in all comparison methods.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return