skip to main content
poster

Droid-Sec: deep learning in android malware detection

Published:17 August 2014Publication History
Skip Abstract Section

Abstract

As smartphones and mobile devices are rapidly becoming indispensable for many network users, mobile malware has become a serious threat in the network security and privacy. Especially on the popular Android platform, many malicious apps are hiding in a large number of normal apps, which makes the malware detection more challenging. In this paper, we propose a ML-based method that utilizes more than 200 features extracted from both static analysis and dynamic analysis of Android app for malware detection. The comparison of modeling results demonstrates that the deep learning technique is especially suitable for Android malware detection and can achieve a high level of 96% accuracy with real-world Android application sets.

References

  1. Y. Bengio. Learning deep architectures for ai. Foundations and trends in Machine Learning, 2(1):1--127, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI'10, volume 10, pages 1--6, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Y. Zhou and X. Jiang. Dissecting android malware: characterization and evolution. In IEEE S&P'12, pages 95--109, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Droid-Sec: deep learning in android malware detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 44, Issue 4
      SIGCOMM'14
      October 2014
      672 pages
      ISSN:0146-4833
      DOI:10.1145/2740070
      Issue’s Table of Contents

      Copyright © 2014 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 August 2014

      Check for updates

      Qualifiers

      • poster

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader