期刊文献+

可解释的基于图嵌入的Android恶意软件自动检测 被引量:4

Interpretable Automatic Detection of Android Malware Based on Graph Embedding
下载PDF
导出
摘要 Android恶意软件的几何式增长驱动了Android恶意软件自动检测领域的发展。一些工作从可解释性的角度来分析Android恶意软件,通过分析模型获取最大影响的特征,为深度学习模型提供了一定的可解释性。这些方法基于特征相互独立的强假设,仅仅考虑特征各自对模型的影响,而在实际中特征之间总是存在着耦合,仅考虑单个特征对模型的影响,难以反映耦合作用,不能刻画不同类型软件中敏感API的组合模式。为解决该问题,将Android软件刻画成图,并结合图的结构信息和图节点内部的信息提出了一种基于图嵌入的方法来检测Android恶意软件。该方法通过注意力机制学习Android软件的低维稠密嵌入表示。实验结果表明,使用学到的嵌入表示进行恶意软件检测,不仅具有较高的分类精度,还可以通过分析注意力分数较大的路径寻找影响模型决策的模式以及定位恶意行为所涉及的敏感API序列。 The geometric growth of Android malware has driven the development of Android malware detection.Some work analyzed Android malware from the perspective of interpretability,and obtained the characteristics of the greatest impact through analyzing the model,which provided certain interpretability for the deep learning model.These methods,based on the strong assumption that features are independent of each other,only consider the influence of features on the model,while in practice there is always coupling between features.Considering only the influence of a single feature on the model,it is difficult to reflect the coupling effect and cannot describe the combination pattern of sensitive API in different types of software.To solve this problem,Android software is depicted as a graph,and combining the structure information of the graph and the information inside the graph node,a method based on graph embedding is proposed to detect Android malware.This method learns the low dimensional dense embedded representation of Android software through the attention mechanism.Experimental results show that using the learned embedded representation for malware detection not only has a higher classification accuracy,but also can find the patterns affecting model decision-making and locate the sensitive API sequences involved in malicious behavior by analyzing the path with a large attention score.
作者 王玉联 鲁鸣鸣 WANG Yulian;LU Mingming(School of Computer Science,Central South University,Changsha 410083,China)
出处 《计算机工程与应用》 CSCD 北大核心 2021年第23期122-128,共7页 Computer Engineering and Applications
基金 国家自然科学基金(61232001,61173169,91646115,60903222) 湖南省自然科学基金(2016JJ2149,018JJ3012) 湖南省战略性新兴产业重大科技攻关项目基金(2012GK4054) 中南大学研究生自主探索创新项目(2018zzts571)。
关键词 Android恶意软件 图嵌入学习 敏感API序列 注意力机制 Android malware graph embedded learning sensitive API sequence attention mechanism
  • 相关文献

参考文献1

二级参考文献34

  • 1Gartner, Gartner says Android has surpassed a billion shipments of devices, http://www.gartner.com/ newsroongid/2954317, 2015.
  • 2T. Vidas, D. Votipka, and N. Christin, All your droid are belong to us: A survey of current Android attacks, inProceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT), 2011, pp. 81-90.
  • 3A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, A survey of mobile malware in the wild, in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2011, pp. 3-14.
  • 4McAfee, McAfee labs threats report, http://www. mcafee.con-dus/resources/reports/rp-quarterly-threat-q4- 2013.pdf, 2015.
  • 5A. Mylonas, A. Kastania, and D. Gritzalis, Delegate the smartphone user? Security awareness in smartphone platforms, Computers & Security, vol. 34, pp. 47-66, 2013.
  • 6Z. Fang, W. Han, and Y. Li, Permission based Android security: Issues and countermeasures, Computers & Security, vol. 43, pp. 205-218, 2014.
  • 7J. Xu, Y.-T. Yu, Z. Chert, B. Cao, W. Dong, Y. Guo, and J. Cao, Mobsafe: Cloud computing based forensic analysis for massive mobile applications using data mining, Tsinghua Science and Technology, vol. 18, no. 4, pp. 418--427, 2013.
  • 8R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, Whyper: Towards automating risk assessment of mobile applications, in Proceedings of the 22nd USENIX Security Symposium (USENIX Security), 2013, pp. 527-542.
  • 9Z. Qu, V. Rastogi, X. Zhang, Y. Chen, T. Zhu, and Z. Chen, Autocog: Measuring the description-to-permission fidelity in Android applications, in Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS), 2014, pp. 1354-1365.
  • 10D. Geneiatakis, I. N. Fovino, I. Kounelis, and P. Stirparo, A permission verification approach for Android mobile applications, Computers & Security, vol. 49, pp. 192-205, 2015.

共引文献36

同被引文献49

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部