Skip to main content

Three-Layered Hybrid Analysis Technique for Android Malware Detection

  • Conference paper
  • First Online:
Advances in Data Science and Computing Technologies (ADSC 2022)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 1056))

Abstract

In these days, smartphones become an essential gadget that can perform multiple routine activities like banking, education, entertainment, etc. A large number of companies are developing new smartphones with latest tools and technologies to attract the people. But data security is one of the main issues which is still a hurdle for all because as the technology is growing malware authors are also developing new malwares to attack these mobile devices to show their existence and sometimes for monetary benefits. Android is most used mobile operating system, and this is the reason it is targeted by malware authors or attackers. Malware detection systems are also developed but still there is need to work on this issue. In this paper, we have proposed a technique that will detect the malwares in Android operating system. It is a hybrid technique based on three-layered crossed analysis. In this, we will apply static analysis on first two layers and dynamic on third layer. Visualization and string search analysis will work on static phase, and system call log analysis will check the behaviour of running application. So, it will cover all the packed application along with code obfuscation, metamorphic malware and zero-day attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saracino A, Sgandurra D, Dini G, Martinelli F (2018) Madam: effective and efficient behavior-based android malware detection and prevention. IEEE Trans Dependable Secure Comput 15(1):83–97

    Article  Google Scholar 

  2. Tam K, Feizollah A, Anuar NB, Salleh R, Cavallaro L (2017) The evolution of android malware and android analysis techniques. ACM Comput Surv 49(4, Article No. 76):1–41

    Article  Google Scholar 

  3. Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on security and privacy. IEEE, pp 95–109

    Google Scholar 

  4. Cooper VN, Shahriar H, Haddad HM (2014) A survey of android malware characterisitics and mitigation techniques. In: 2014 11th International conference on information technology: new generations. IEEE, pp 327–332

    Google Scholar 

  5. Faruki P et al (2015) Android security: a survey of issues, malware penetration, and defenses. IEEE Commun Surv Tutorials 17(2):998–1022

    Google Scholar 

  6. Rahali A, Lashkari AH, Kaur G, Taheri L, Gagnon F, Massicotte F (2020) DIDroid: android malware classification and characterization using deep image learning. In: ICCNS 2020: 2020 the 10th international conference on communication and network security, pp 70–82

    Google Scholar 

  7. Gasparis I, Qian Z, Song C, Krishnamurthy SV (2017) Detecting android root exploits by learning from root providers. In: 26th USENIX Security symposium (USENIX Security 17), pp 1129–1144

    Google Scholar 

  8. Alsoghyer S, Almomani I (2019) Ransomware detection system for Android applications. Electronics 8(8):868

    Article  Google Scholar 

  9. Sharma T, Rattan D (2021) Malicious application detection in android—a systematic literature review. Comput. Sci. Rev. 40:100373

    Article  Google Scholar 

  10. Idrees F, Rajarajan M, Conti M, Chen TM, Rahulamathavan Y (2017) PIndroid: a novel Android malware detection system using ensemble learning methods. Comput Secur 68:36–46

    Google Scholar 

  11. Aldini A, Martinelli F, Saracino A, Sgandurra D (2015) Detection of repackaged mobile applications through a collaborative approach. Concurr Comput Pract Exp 27(11):2818–2838

    Article  Google Scholar 

  12. Choi J, Sung W, Choi C, Kim P (2015) Personal information leakage detection method using the inference-based access control model on the Android platform. Pervasive Mob Comput 24:138–149

    Article  Google Scholar 

  13. Castillo CA et al (2011) Android malware past, present, and future. In: McAfee white paper, mobile security working group, vol 1, p 16

    Google Scholar 

  14. Arora T, Soni R (2021) Chapter 6—a review of techniques to detect the GAN-generated fake images. In: Generative Adversarial Networks for Image-to-Image Translation, pp 125–159

    Google Scholar 

  15. Chan PPK, Song W-K (2014) Static detection of Android malware by using permissions and API calls. In: 2014 International conference on machine learning and cybernetics. IEEE, pp 82–87

    Google Scholar 

  16. Afonso VM, de Amorim MF, Grégio ARA, Junquera GB, de Geus PL (2015) Identifying Android malware using dynamically obtained features. J Comput Virol Hack Tech 11(1):9–17

    Article  Google Scholar 

  17. Ding C, Luktarhan N, Lu B, Zhang W (2021) A hybrid analysis-based approach to android malware family classification. Entropy 23(8):1009

    Article  Google Scholar 

  18. Shijo PV, Salim A (2015) Integrated static and dynamic analysis for malware detection. Procedia Comput Sci 46:804–811

    Article  Google Scholar 

  19. Kabakus AT, Dogru IA (2018) An in-depth analysis of Android malware using hybrid techniques. Digit Investig 24:25–33

    Article  Google Scholar 

  20. Arshad S, Shah MA, Wahid A, Mehmood A, Song H, Yu H (2018) SAMADroid: a novel 3-level hybrid malware detection model for android operating system. IEEE Access 6:4321–4339

    Article  Google Scholar 

  21. Wu Q, Qin Z, Zhang J, Yin H, Yang G, Hu K (2017) Android malware detection using local binary pattern and principal component analysis. In: Data science (ICPCSEE 2017). Communications in computer and information science, vol 727. Springer, Singapore, pp 262–275

    Google Scholar 

  22. Yen Y-S, Sun H-M (2019) An Android mutation malware detection based on deep learning using visualization of importance from codes. Microelectron Reliab 93:109–114

    Article  Google Scholar 

  23. Ding Y, Zhang X, Hu J, Xu W (2023) Android malware detection method based on bytecode image. J Ambient Intell Human Comput14:6401–6410

    Google Scholar 

  24. Daoudi N, Samhi J, Kabore AK, Allix K, Bissyandé TF, Klein J (2021) DexRay: a simple, yet effective deep learning approach to android malware detection based on image representation of bytecode. In: Deployable machine learning for security defense (MLHat 2021). Communications in computer and information science, vol 1482. Springer, Cham, pp 81–106

    Google Scholar 

  25. Tong F, Yan Z (2017) A hybrid approach of mobile malware detection in Android. J Parallel Distrib Comput 103:22–31

    Article  Google Scholar 

  26. Dhalaria M, Gandotra E (2020) A hybrid approach for android malware detection and family classification. Int J Interact Multimed Artif Intell 6(6):174–188

    Google Scholar 

  27. Surendran R, Thomas T, Emmanuel S (2020) A TAN based hybrid model for android malware detection. J Inf Secur Appl. 54:102483

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tejpal Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, T., Rattan, D. (2023). Three-Layered Hybrid Analysis Technique for Android Malware Detection. In: Chakraborty, B., Biswas, A., Chakrabarti, A. (eds) Advances in Data Science and Computing Technologies. ADSC 2022. Lecture Notes in Electrical Engineering, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-99-3656-4_31

Download citation

Publish with us

Policies and ethics