Quorum Chain-Based Malware Detection in Android Smart Devices

  • Fei Gao
  • Frank JiangEmail author
  • Yuping Zhang
  • Robin Doss
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1113)


Smart devices are gradually becoming indispensable in people’s daily lives, and Android-based smart devices are taking over the main stream in mobile devices. However, while Android smart devices bring convenience to customers, they also bring problems. Due to the open-sourced nature of the Android system, malicious programs and software attacks pose a significant security risk to user data. Therefore, the detection of malware has always been a critical issue. For a long time, various malware detection schemes have been proposed, which have gradually improved the detection of malware. Traditional detection methods are based on static or dynamic detection techniques. In recent years, with the advancement of technology, malware detection based on machine learning ideas has been widely used, such as K-NN, deep learning, decision trees, and so on. Blockchain has been widely used in many fields since its birth. This paper combines traditional detection methods and ensemble learning algorithms to propose a malware detection technology based on QuorumChain framework (blockchain technology). The experimental results verify that the proposed new model is better than other models in precision, recall and f1-measure.


Android devices Malware detection Quorum chain 


  1. 1.
    IDC.COM: Smartphone market share. Accessed 30 June 2019
  2. 2.
    National Computer Network Emergency Technical Processing Coordination Center. Specification for mobile internet malicious code, YD/T 2439 (2012)Google Scholar
  3. 3.
    Chen, K., Wang, P., Lee, Y., Wang, X., Zhang, N., Huang, H., et al.: Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-play scale. In: Usenix Conference on Security Symposium. USENIX Association (2015)Google Scholar
  4. 4.
    Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware Android malware classification using weighted contextual API dependency graphs (2014)Google Scholar
  5. 5.
    Xiao, X., Xiao, X., Jiang, Y., Liu, X., Ye, R.: Identifying Android malware with system call co-occurrence matrices. Trans. Emerg. Telecommun. Technol. 27(5), 675–684 (2016)CrossRefGoogle Scholar
  6. 6.
    Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detection of malicious applications on Android OS. In: Sako, H., Franke, K.Y., Saitoh, S. (eds.) IWCF 2010. LNCS, vol. 6540, pp. 138–149. Springer, Heidelberg (2011). Scholar
  7. 7.
    Fuchs, A.P., Chaudhuri, A., Foster, J.S.: SCanDroid: automated security certification of Android applications (2009)Google Scholar
  8. 8.
    Shang, F., Li, Y., Deng, X., He, D.: Android malware detection method based on Naive Bayes and permission correlation algorithm. Cluster Comput. 21(8), 1–12 (2017)Google Scholar
  9. 9.
    Li, Y., Shen, T., Sun, X., Pan, X., Miao, B.: Detection, classification and characterization of Android malware using API data dependency. In: Thuraisingham, B., Wang, X., Yegneswaran, V. (eds.) SecureComm 2015. LNCS, vol. 164, pp. 23–40. Springer, Cham (2015). Scholar
  10. 10.
    Bhatia, T., Kaushal, R.: Malware detection in Android based on dynamic analysis. In: 2017 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE (2017)Google Scholar
  11. 11.
    Enck, W., Gilbert, P.: TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. In: Proceedings of the Usenix Symposium on Operating System Design and Implementation, OSDI, Vancouver, BC, Canada, 4–6 October 2010, pp. 393–407. DBLP (2010)Google Scholar
  12. 12.
    Bläsing, T., Batyuk, L., Schmidt, A.D., Camtepe, S.A., Albayrak, S.: An Android application sandbox system for suspicious software detection. In: 2010 5th International Conference on Malicious and Unwanted Software (MALWARE). IEEE (2010)Google Scholar
  13. 13.
    Su, M.Y., Fung, K.T., Huang, Y.H., Kang, M.Z., Chung, Y.H.: Detection of Android malware: combined with static analysis and dynamic analysis. In: 2016 International Conference on High Performance Computing & Simulation (HPCS). IEEE (2016)Google Scholar
  14. 14.
    Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: Android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114–123 (2016)CrossRefGoogle Scholar
  15. 15.
    Zhang, X., Hu, D., Fan, Y., Yu, K.: A novel Android malware detection method based on Markov blanket. In: IEEE International Conference on Data Science in Cyberspace. IEEE (2016)Google Scholar
  16. 16.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). 《Consulted》
  17. 17.
    Di Pierro, M.: What is the blockchain? IEEE Comput. Sci. Eng. 19, 92–95 (2017)CrossRefGoogle Scholar
  18. 18.
    Puthal, D., Malik, N.: The blockchain as a decentralized security framework [future directions]. IEEE Consum. Electron. Mag. 7(2), 18–21 (2018)CrossRefGoogle Scholar
  19. 19.
    Thomas, G.D.: Machine learning research: four current directions. AI Mag. 18(4), 97–136 (1997)Google Scholar
  20. 20.
    Zhihua, Z.: Machine Learning (Chinese Edition), pp. 171–191. Tsinghua University Press, Beijing (2016)Google Scholar
  21. 21.
    Cummins, M., Newman, P.: Probabilistic appearance based navigation and loop closing. In: IEEE International Conference on Robotics & Automation. IEEE (2007)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Fei Gao
    • 1
  • Frank Jiang
    • 2
    Email author
  • Yuping Zhang
    • 3
  • Robin Doss
    • 2
  1. 1.College of Electronics EngineeringGuangxi Normal UniversityGuilinChina
  2. 2.School of Info TechnologyDeakin UniversityGeelongAustralia
  3. 3.Chengdu Technological UniversityChengduChina

Personalised recommendations