Skip to main content

Android Malware Detection Method Based on Function Call Graphs

  • Conference paper
  • First Online:
Neural Information Processing (ICONIP 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9950))

Included in the following conference series:

Abstract

With the rapid development of mobile Internet, mobile devices have been widely used in people’s daily life, which has made mobile platforms a prime target for malware attack. In this paper we study on Android malware detection method. We propose the method how to extract the structural features of android application from its function call graph, and then use the structure features to build classifier to classify malware. The experiment results show that structural features can effectively improve the performance of malware detection methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Enck, W., Octeau, D., Mcdaniel, P.: A study of android application security. In: Proceedings of the 20th Usenix Security Conference, p. 21 (2011)

    Google Scholar 

  2. Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of 16th ACM Conference on Computer and Communications Security, pp. 235–245 (2009)

    Google Scholar 

  3. Sarma, B.P., Li, N., Gates, C., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Android permissions: a perspective combining risks and benefits. In: Proceedings of 17th ACM Symposium Access Control Models Technologies, pp. 13–22 (2012)

    Google Scholar 

  4. Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R., Nita-Rotaru, C., Molloy, I.: Using probabilistic generative models for ranking risks of Android apps. In: Proceedings of ACM Conference on Computer and Communications Security, pp. 241–252 (2012)

    Google Scholar 

  5. Kim, S., Cho, J.I., Myeong, H.W., Lee, D.H.: A study on static analysis model of mobile application for privacy protection. In: Park, J.J., Chao, H.-C., Obaidat, M.S., Kim, J. (eds.) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol. 114, pp. 529–540. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative Android markets. In: Proceedings of the 19th Annual Network & Distributed System Security Symposium, February 2012

    Google Scholar 

  7. Hao, H., Singh, V., Du, W.: On the effiectiveness of api-level access control using bytecode rewriting in android. In: Proceedings of the ACM SIGSAC Symposium on Information, Computer and Communications Security (2013)

    Google Scholar 

  8. Kashima, H.: A linear-time graph kernel. In: Proceedings of the Ninth IEEE International Conference on Data Mining, pp. 179–188 (2009)

    Google Scholar 

  9. Gärtner, T., Lloyd, J.W., Flach, P.A.: Kernels and distances for structured data. Mach. Learn. 57(3), 205–232 (2004)

    Article  MATH  Google Scholar 

  10. Schölkopf, B., Platt, J., Hofmann, T.: Fast computation of graph kernels. In: Advances in Neural Information Processing Systems 19 NIPS, pp. 1449–1456 (2006, 2007)

    Google Scholar 

  11. Shervashidze, N., Schweitzer, P., Leeuwen, E.J.V., et al.: Weisfeiler-Lehman graph kernels. J. Mach. Learn. Res. 1(3), 1–48 (2011)

    MathSciNet  MATH  Google Scholar 

  12. Ding, Y., Yuan, X., Zhou, D., Dong, L., An, Z.: Feature representation and selection in malicious code detection methods based on static system calls. Comput. Secur. 30, 514–524 (2011)

    Article  Google Scholar 

  13. Malware Geome Project. http://www.malgenomeproject.org

Download references

Acknowledgment

This work was partially supported by Scientific Research Foundation in Shenzhen (Grant No. JCYJ20140627163809422, JCYJ20160525163756635), Guangdong Natural Science Foundation (Grant No. 2016A030313664) and Key Laboratory of Network Oriented Intelligent Computation (Shenzhen).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuxin Ding .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Ding, Y., Zhu, S., Xia, X. (2016). Android Malware Detection Method Based on Function Call Graphs. In: Hirose, A., Ozawa, S., Doya, K., Ikeda, K., Lee, M., Liu, D. (eds) Neural Information Processing. ICONIP 2016. Lecture Notes in Computer Science(), vol 9950. Springer, Cham. https://doi.org/10.1007/978-3-319-46681-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-46681-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-46680-4

  • Online ISBN: 978-3-319-46681-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics