skip to main content
10.1145/3412841.3442080acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
poster

Detecting and categorizing Android malware with graph neural networks

Published: 22 April 2021 Publication History

Abstract

Android is the most dominant operating system in the mobile ecosystem. As expected, this trend did not go unnoticed by miscreants, and quickly enough, it became their favorite platform for discovering new victims through malicious apps. These apps have become so sophisticated that they can bypass anti-malware measures implemented to protect the users. Therefore, it is safe to admit that traditional anti-malware techniques have become cumbersome, sparking the urge to come up with an efficient way to detect Android malware. In this paper, we present a novel Natural Language Processing (NLP) inspired Android malware detection and categorization technique based on Function Call Graph Embedding. We design a graph neural network (graph embedding) based approach to convert the whole graph structure of an Android app to a vector. We then utilize the graphs' vectors to detect and categorize the malware families. Our results reveal that graph embedding yields better results as we get 99.6% accuracy on average for the malware detection and 98.7% accuracy for the malware categorization.

References

[1]
K. Allix, T. F. Bissyandé, J. Klein, and Y. Le Traon. Androzoo: Collecting Millions of Android Apps for the Research Community. In IEEE/ACM Working Conference on Mining Software Repositories (MSR), 2016.
[2]
S. Arora, Y. Liang, and T. Ma. A Simple but Tough-To-Beat Baseline for Sentence Embeddings. 2016.
[3]
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, K. Rieck, and C. Siemens. Drebin: Effective and Explainable Detection of Android Malware in Your Pocket. In Network and Distributed System Security Symposium (NDSS), 2014.
[4]
C. Chen, Y. Liu, B. Shen, and J.-J. Cheng. Android Malware Detection Based on Static Behavior Feature Analysis. Journal of Computers, 29(6):243--253, 2018.
[5]
H. Gascon, F. Yamaguchi, D. Arp, and K. Rieck. Structural Detection of Android Malware Using Embedded Call Graphs. In ACM workshop on Artificial intelligence and security, 2013.
[6]
I. U. Haq and J. Caballero. A Survey of Binary Code Similarity, 2019.
[7]
C. Li, R. Zhu, D. Niu, K. Mills, H. Zhang, and H. Kinawi. Android Malware Detection Based on Factorization Machine. arXiv preprint arXiv:1805.11843, 2018.
[8]
D. Maiorca, D. Ariu, I. Corona, M. Aresu, and G. Giacinto. Stealth Attacks: An Extended Insight Into the Obfuscation Effects on Android Malware. Computers & Security, 51:16--31, 2015.
[9]
T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. Distributed Representations of Words and Phrases and Their Compositionality. In Advances in neural information processing systems, 2013.
[10]
L. Onwuzurike, E. Mariconti, P. Andriotis, E. D. Cristofaro, G. Ross, and G. Stringhini. MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. ACM Transactions on Privacy and Security, 22(2):1--34, 2019.
[11]
Y. Shen and G. Stringhini. Attack2vec: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks. In USENIX Security Symposium, 2019.
[12]
F. Wei, Y. Li, S. Roy, X. Ou, and W. Zhou. Deep Ground Truth Analysis of Current Android Malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2017.
[13]
D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu. Droidmat: Android Malware Detection Through Manifest and Api Calls Tracing. In Asia Joint Conference on Information Security, 2012.
[14]
P. Xu, B. Kolosnjaji, C. Eckert, and A. Zarras. MANIS: Evading Malware Detection System on Graph Structure. In ACM Symposium on Applied Computing, 2020.
[15]
S. Zhao, X. Li, G. Xu, L. Zhang, and Z. Feng. Attack Tree Based Android Malware Detection With Hybrid Analysis. In IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2014.

Cited By

View all
  1. Detecting and categorizing Android malware with graph neural networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing
      March 2021
      2075 pages
      ISBN:9781450381048
      DOI:10.1145/3412841
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 April 2021

      Check for updates

      Badges

      • Best Poster

      Qualifiers

      • Poster

      Funding Sources

      • European Union?s Horizon 2020

      Conference

      SAC '21
      Sponsor:
      SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing
      March 22 - 26, 2021
      Virtual Event, Republic of Korea

      Acceptance Rates

      Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

      Upcoming Conference

      SAC '25
      The 40th ACM/SIGAPP Symposium on Applied Computing
      March 31 - April 4, 2025
      Catania , Italy

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)60
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 10 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media