With more than two million applications, Android marketplaces require automatic and scalable methods to efficiently vet apps for the absence of malicious threats. On the other hand, Modern malware is designed by obfuscation characteristics, which causes an enormous growth in the number of malware samples. Classification of this huge number of malware samples on the basis of their behaviors is essential for the computer security community. Although there are a quite good number classification techniques, it is usual that sometimes researchers neglect modeling some parts of applications that might be misused by adversaries. In this thesis, we aim to show how we can improve the accuracy of malware classifiers by considering some neglected functions of Android applications. To this end, first, we do a comprehensive survey on Android security issues with a focus on application analysis. Then, we modeled three important functions of Android applications such as HTTP communication channel, GCM communication channel, and code hiding techniques (e.g., dynamic code loading) to outperform the existing classification techniques. We prove our claim by performing experiments on a large set of Android applications and represent the power of wisely engineered features for having an effective learning-based malware classification system.

Modeling Neglected Functions of Android Applications to Effectively Detect Malware

AHMADI, MANSOUR
2017-04-11

Abstract

With more than two million applications, Android marketplaces require automatic and scalable methods to efficiently vet apps for the absence of malicious threats. On the other hand, Modern malware is designed by obfuscation characteristics, which causes an enormous growth in the number of malware samples. Classification of this huge number of malware samples on the basis of their behaviors is essential for the computer security community. Although there are a quite good number classification techniques, it is usual that sometimes researchers neglect modeling some parts of applications that might be misused by adversaries. In this thesis, we aim to show how we can improve the accuracy of malware classifiers by considering some neglected functions of Android applications. To this end, first, we do a comprehensive survey on Android security issues with a focus on application analysis. Then, we modeled three important functions of Android applications such as HTTP communication channel, GCM communication channel, and code hiding techniques (e.g., dynamic code loading) to outperform the existing classification techniques. We prove our claim by performing experiments on a large set of Android applications and represent the power of wisely engineered features for having an effective learning-based malware classification system.
11-apr-2017
File in questo prodotto:
File Dimensione Formato  
phd.pdf

accesso aperto

Descrizione: tesi di dottorato
Dimensione 1.51 MB
Formato Adobe PDF
1.51 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11584/249557
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact