Skip to main content
Top

2021 | OriginalPaper | Chapter

A Study of Android Malware Detection Using Static Analysis

Authors : Kapil Sharma, Anish Singh, Prateek Arora

Published in: Computer Networks and Inventive Communication Technologies

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Smartphones have experienced blazing popularity and become more and more sophisticated over recent years; as a result, they have become an appealing target for malware authors. Malware keeps evolving and becomes more dangerous and harmful each day. Therefore, it is the need of the hour to detect and stop the spread of this previously unknown malware. It is also vital to detect and classify this malware, and machine learning has proven to be helpful in this field. For machine learning algorithms to achieve better performance, it is necessary to collect essential features from the application by reverse-engineering the APK file. However, this gives malware authors the upper hand as they started developing special anti-analysis techniques to mislead the machine learning-based analysis by obfuscation techniques to hide the application’s malicious behaviour. This study summarizes the static malware detection approach using different machine learning techniques, with emphasis on present-day research, challenges, and future directions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
5.
go back to reference Peiravian N, Zhu X (2013) Machine learning for android malware detection using permission and API calls. In: IEEE 25th international conference on tools with artificial intelligence, pp 300–305 Peiravian N, Zhu X (2013) Machine learning for android malware detection using permission and API calls. In: IEEE 25th international conference on tools with artificial intelligence, pp 300–305
6.
go back to reference Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, Alvarez G (2013) PUMA: permission usage to detect malware in android. In: Advances in intelligent systems and computing, vol 189. International joint conference CISIS’ 12-ICEUTE’ 12-S0CO’ 12 special sessions. pp 289–298 Sanz B, Santos I, Laorden C, Ugarte-Pedrero X, Bringas PG, Alvarez G (2013) PUMA: permission usage to detect malware in android. In: Advances in intelligent systems and computing, vol 189. International joint conference CISIS’ 12-ICEUTE’ 12-S0CO’ 12 special sessions. pp 289–298
7.
go back to reference Nishimoto Y, Kajiwara N, Matsumoto S, Hori Y, Sakurai K (2013) Detection of android API call using logging mechanism within android framework, vol 127. Springer International Publishing, pp 393–404 Nishimoto Y, Kajiwara N, Matsumoto S, Hori Y, Sakurai K (2013) Detection of android API call using logging mechanism within android framework, vol 127. Springer International Publishing, pp 393–404
10.
go back to reference Raveendranath R, Datta SK (2014) Android malware attacks and countermeasures: current and future directions. In: International conference on control, instrumentation, communication and computational technologies (ICCICCT), pp 137–138 Raveendranath R, Datta SK (2014) Android malware attacks and countermeasures: current and future directions. In: International conference on control, instrumentation, communication and computational technologies (ICCICCT), pp 137–138
11.
go back to reference Blaauboer S (2018) The evolution of smartphone malware: analyzing and combating android malware. ProQuest Blaauboer S (2018) The evolution of smartphone malware: analyzing and combating android malware. ProQuest
14.
go back to reference Schlegel R, Zhang K, Zhou X, Intwala M, Kapadia A, Wang X (2011) Soundcomber: a stealthy and context-aware sound Trojan for smartphones. NDSS Schlegel R, Zhang K, Zhou X, Intwala M, Kapadia A, Wang X (2011) Soundcomber: a stealthy and context-aware sound Trojan for smartphones. NDSS
15.
go back to reference Feily M, Shahrestani A, Ramadass S (2009) A survey of botnet and botnet detection. In: Third international conference on emerging security information, systems and technologies, p 268 Feily M, Shahrestani A, Ramadass S (2009) A survey of botnet and botnet detection. In: Third international conference on emerging security information, systems and technologies, p 268
16.
go back to reference Lee H, Kang T, Lee S, Kim J, Kim Y (2014) Punobot: mobile botnet using push notification service in android. In: Information security applications, vol 8267. WISA 2013, pp 124–137 Lee H, Kang T, Lee S, Kim J, Kim Y (2014) Punobot: mobile botnet using push notification service in android. In: Information security applications, vol 8267. WISA 2013, pp 124–137
17.
go back to reference Martinelli F, Mercaldo F, Nardone V, Santone A, Vaglini G (2020) Model checking to detect the Hummingbad malware. In: Intelligent distributed computing XIII. Studies in computational intelligence, pp 485–494 Martinelli F, Mercaldo F, Nardone V, Santone A, Vaglini G (2020) Model checking to detect the Hummingbad malware. In: Intelligent distributed computing XIII. Studies in computational intelligence, pp 485–494
18.
go back to reference Baskaran B, Ralescu A (2016) A study of android malware detection techniques and machine learning. In: MAICS, pp 15–23 Baskaran B, Ralescu A (2016) A study of android malware detection techniques and machine learning. In: MAICS, pp 15–23
19.
go back to reference Barrera D, Kayacık HG, Oorschot PV, Somayaji A (2010) A methodology for empirical analysis of permission-based security models and its application to android. In: 17th ACM conference on computer and communications security—CSS’10, pp 73–84 Barrera D, Kayacık HG, Oorschot PV, Somayaji A (2010) A methodology for empirical analysis of permission-based security models and its application to android. In: 17th ACM conference on computer and communications security—CSS’10, pp 73–84
20.
go back to reference Xiaoyan Z, Juan F, Xiujuan W (2014) Android malware detection based on permissions. In: International conference on information and communications technologies (ICT 2014) Xiaoyan Z, Juan F, Xiujuan W (2014) Android malware detection based on permissions. In: International conference on information and communications technologies (ICT 2014)
21.
go back to reference Liu X, Liu J (2014) A two-layered permission-based android malware detection scheme. In: 2nd IEEE international conference on mobile cloud computing, services, and engineering, pp 142–148 Liu X, Liu J (2014) A two-layered permission-based android malware detection scheme. In: 2nd IEEE international conference on mobile cloud computing, services, and engineering, pp 142–148
22.
go back to reference Sun L, Li Z, Yan Q, Srisa-An W, Pan Y (2016) SigPID: significant permission identification for android malware detection. In: 11th International conference on malicious and unwanted software (MALWARE) Sun L, Li Z, Yan Q, Srisa-An W, Pan Y (2016) SigPID: significant permission identification for android malware detection. In: 11th International conference on malicious and unwanted software (MALWARE)
23.
go back to reference Tchakounté F, Wandala AD, Tiguiane Y (2019) Detection of android malware based on sequence alignment of permissions. Int J Comput (IJC) 35:26–36 Tchakounté F, Wandala AD, Tiguiane Y (2019) Detection of android malware based on sequence alignment of permissions. Int J Comput (IJC) 35:26–36
24.
go back to reference Hou S, Saas A, Ye Y, Chen L (2016) DroidDelver: an android malware detection system using deep belief network based on API call blocks. In: Web-age information management, WAIM, vol 9998. pp 54–66 Hou S, Saas A, Ye Y, Chen L (2016) DroidDelver: an android malware detection system using deep belief network based on API call blocks. In: Web-age information management, WAIM, vol 9998. pp 54–66
25.
go back to reference Choi S, Sun K, Eom H Android malware detection using library API call tracing and semantic-preserving signal processing techniques. Report Choi S, Sun K, Eom H Android malware detection using library API call tracing and semantic-preserving signal processing techniques. Report
26.
go back to reference Vij D, Balachandran V, Thomas T, Surendran R (2020) GRAMAC: a graph based android malware classification mechanism. In: CODASPY ‘20: proceedings of the tenth ACM conference on data and application security and privacy, pp 156–158 Vij D, Balachandran V, Thomas T, Surendran R (2020) GRAMAC: a graph based android malware classification mechanism. In: CODASPY ‘20: proceedings of the tenth ACM conference on data and application security and privacy, pp 156–158
27.
go back to reference Kang B, Yerima SY, Sezer S, McLaughin K (2016) N-gram opcode analysis for android malware detection. Int J Cyber Situational Awareness 1(1):1–24CrossRef Kang B, Yerima SY, Sezer S, McLaughin K (2016) N-gram opcode analysis for android malware detection. Int J Cyber Situational Awareness 1(1):1–24CrossRef
28.
go back to reference Chen YM, Hsu CH, Chung KCK (2019) A novel preprocessing method for solving long sequence problem in android malware detection. In: Twelfth international conference on ubi-media computing (ubi-media), pp 12–17 Chen YM, Hsu CH, Chung KCK (2019) A novel preprocessing method for solving long sequence problem in android malware detection. In: Twelfth international conference on ubi-media computing (ubi-media), pp 12–17
29.
go back to reference Jiang J, Li S, Yu M, Liu C, Chen K, Liu H, Huang W (2019) Android malware family classification based on sensitive opcode sequence. In: IEEE symposium on computers and communications (ISCC), pp 1–7 Jiang J, Li S, Yu M, Liu C, Chen K, Liu H, Huang W (2019) Android malware family classification based on sensitive opcode sequence. In: IEEE symposium on computers and communications (ISCC), pp 1–7
30.
go back to reference Zhu D, Jin H, Yang Y, Wu D (2017) DeepFlow: deep learning-based malware detection by mining android application for abnormal usage of sensitive data. In: IEEE symposium on computers and communications (ISCC) Zhu D, Jin H, Yang Y, Wu D (2017) DeepFlow: deep learning-based malware detection by mining android application for abnormal usage of sensitive data. In: IEEE symposium on computers and communications (ISCC)
31.
go back to reference Wu S, Wang P, Li X, Zhang Y (2016) Effective detection of android malware based on the usage of data flow APIs and machine learning. Inf Softw Technol Wu S, Wang P, Li X, Zhang Y (2016) Effective detection of android malware based on the usage of data flow APIs and machine learning. Inf Softw Technol
32.
go back to reference Lou S, Cheng S, Huang J, Jiang F (2019) TFDroid: android malware detection by topics and sensitive data flows using machine learning techniques. In: IEEE 2nd international conference on information and computer technologies (ICICT), pp 30–36 Lou S, Cheng S, Huang J, Jiang F (2019) TFDroid: android malware detection by topics and sensitive data flows using machine learning techniques. In: IEEE 2nd international conference on information and computer technologies (ICICT), pp 30–36
33.
go back to reference Ma Z, Ge H, Liu Y, Zhao M, Ma J (2019) A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE Access 7:21235–21245CrossRef Ma Z, Ge H, Liu Y, Zhao M, Ma J (2019) A combination method for android malware detection based on control flow graphs and machine learning algorithms. IEEE Access 7:21235–21245CrossRef
34.
go back to reference Shan P, Li Q, Zhang P, Gu Y (2019) Malware detection method based on control flow analysis. In: ICIT 2019: proceedings of the 2019 7th international conference on information technology: IoT and Smart City, pp 158–164 Shan P, Li Q, Zhang P, Gu Y (2019) Malware detection method based on control flow analysis. In: ICIT 2019: proceedings of the 2019 7th international conference on information technology: IoT and Smart City, pp 158–164
35.
go back to reference Bakour K, Unver HM, Ghanem R (2018) The android malware static analysis: techniques, limitations, and open challenges. In: 3rd International conference on computer science and engineering (UBMK) Bakour K, Unver HM, Ghanem R (2018) The android malware static analysis: techniques, limitations, and open challenges. In: 3rd International conference on computer science and engineering (UBMK)
36.
go back to reference Maiorca D et al (2015) Stealth attacks: an extended insight into the obfuscation effects on Android malware. Comput Secur 51:16–31CrossRef Maiorca D et al (2015) Stealth attacks: an extended insight into the obfuscation effects on Android malware. Comput Secur 51:16–31CrossRef
Metadata
Title
A Study of Android Malware Detection Using Static Analysis
Authors
Kapil Sharma
Anish Singh
Prateek Arora
Copyright Year
2021
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_85