Detecting Android Malware by Combining System Call Sequence Relationships with Local Feature Calculation

Chien Hui Hung, Yi ming Chen, Chao Ching Wu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Android, the most popular operating system in the mobile market, is the main target of hackers. The dynamic analysis in malware analysis is not affected by obfuscation and dynamic loading attacks. Therefore, this study uses a dynamic detection approach and uses system calls as a feature to represent the behaviour of an application. The TF-IDF feature processing method can assign different weights to the system call features according to the number of occurrences and the overall relationship, but this method uses one system call as a unit and therefore does not calculate the pre- and post- sequence relationships, which are important in system call sequences. This study uses the concept of n-grams to form system call groups combined with local TF-IDF to allow sequence-based data to be characterised by the pre-post relationship and importance of the sequences, and to analyse Android applications on a deep learning model that has shown excellent classification results in the field of malware detection. In this study, it is shown that this method improves the accuracy of multiple classification of apps by more than 3% and 11% for the unknown 2019 dataset.

Original languageEnglish
Title of host publicationNew Trends in Computer Technologies and Applications - 25th International Computer Symposium, ICS 2022, Proceedings
EditorsSun-Yuan Hsieh, Ling-Ju Hung, Sheng-Lung Peng, Ralf Klasing, Chia-Wei Lee
PublisherSpringer Science and Business Media Deutschland GmbH
Pages362-373
Number of pages12
ISBN (Print)9789811995811
DOIs
StatePublished - 2022
Event25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022 - Taoyuan, Taiwan
Duration: 15 Dec 202217 Dec 2022

Publication series

NameCommunications in Computer and Information Science
Volume1723 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference25th International Computer Symposium on New Trends in Computer Technologies and Applications, ICS 2022
Country/TerritoryTaiwan
CityTaoyuan
Period15/12/2217/12/22

Keywords

  • Android malware analysis
  • Deep learning
  • Dynamic analysis
  • Sequence relationships
  • System call sequences

Fingerprint

Dive into the research topics of 'Detecting Android Malware by Combining System Call Sequence Relationships with Local Feature Calculation'. Together they form a unique fingerprint.

Cite this