Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 2/2023

26.06.2022 | Research Article-Computer Engineering and Computer Science

ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms

verfasst von: Wael F. Elsersy, Nor Badrul Anuar, Mohd Faizal Ab Razak

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, the newly launched Google protect service alerts Android users from installing rooting tools. However, Android users lean toward rooting their Android devices to gain unlimited privileges, which allows them to customize their devices and allows Android Apps to bypass all Android security logging and security system. Rooting is one of the most malicious tactics that is used by Android malware that offers malware with the ability to open backdoor, server ports, access the Android kernel commands, and silently install malicious App and make them irremovable and undetectable. The existing Android malware detection frameworks propose embedded root-exploit code detection within the Android App. However, most frameworks overlook the rooted device detection part. In addition, many evasion techniques are developed to cloak the rooted devices. The above facts pose the challenging tasks of rooting detection and the current studies highlighted a deficiency in root detection research. Hence, this study proposes “Rootector” Android Rooting Detection Framework that uses machine learning classification techniques to detect Android rooted devices. The study proposes a model using machine learning algorithms that previously proves detection performance excellence in different fields of study. The research creates a rooting dataset with more than 13,000 mobile scans, which incorporates physical Android devices as well as simulators. Using the dataset, the study evaluates the performance of the ten machine learning classifiers to identify the best classification model. The study incorporates hyper-parameter optimization techniques to define the optimal machine learning parameters. The study adopts the LASSO (least absolute shrinkage and selection operator) regression algorithm to identify the best minimum number of classification features, which forms a compact dataset. Using LASSO regression, the study proposes a compact model for Android rooting detection. The experimental evaluation results show a very promising performance of Rootector framework with about 98.16% overall accuracy using the full dataset and slightly degraded to 97.13% using the compact dataset.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Oester, P.: Dirty Cow (CVE-2016–5195) (2016). Oester, P.: Dirty Cow (CVE-2016–5195) (2016).
7.
Zurück zum Zitat Spreitzer, R.; Griesmayr, S.; Korak, T.; Mangard, S.: Exploiting data-usage statistics for website fingerprinting attacks on android. In: 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2016 (2016). https://doi.org/10.1145/2939918.2939922 Spreitzer, R.; Griesmayr, S.; Korak, T.; Mangard, S.: Exploiting data-usage statistics for website fingerprinting attacks on android. In: 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2016 (2016). https://​doi.​org/​10.​1145/​2939918.​2939922
8.
Zurück zum Zitat Geist, D., Nigmatullin, M., Bierens, R.: Jailbreak/Root Detection Evasion Study on iOS and Android. University of Amsterdam (2016) Geist, D., Nigmatullin, M., Bierens, R.: Jailbreak/Root Detection Evasion Study on iOS and Android. University of Amsterdam (2016)
10.
Zurück zum Zitat Nguyen-Vu, L.; Chau, N.-T.; Kang, S.; Jung, S.: Android rooting: An arms race between evasion and detection. In: Security and Communication Networks 2017 (2017). Nguyen-Vu, L.; Chau, N.-T.; Kang, S.; Jung, S.: Android rooting: An arms race between evasion and detection. In: Security and Communication Networks 2017 (2017).
12.
14.
Zurück zum Zitat Ham, Y.J.; Choi, W.-B.; Lee, H.-W.: Mobile root exploit detection based on system events extracted from android platform. In: Proceedings of the International Conference on Security and Management (SAM) 2013, p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) Ham, Y.J.; Choi, W.-B.; Lee, H.-W.: Mobile root exploit detection based on system events extracted from android platform. In: Proceedings of the International Conference on Security and Management (SAM) 2013, p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp)
23.
Zurück zum Zitat Gasparis, I.; Qian, Z.; Song, C.; Krishnamurthy, S.V.: Detecting android root exploits by learning from root providers. In: 26th {USENIX} Security Symposium ({USENIX} Security 17) 2017, pp. 1129–1144. USENIX} Association} Gasparis, I.; Qian, Z.; Song, C.; Krishnamurthy, S.V.: Detecting android root exploits by learning from root providers. In: 26th {USENIX} Security Symposium ({USENIX} Security 17) 2017, pp. 1129–1144. USENIX} Association}
24.
Zurück zum Zitat Feizollah, A.; Anuar, N.B.; Salleh, R.; Suarez-Tangil, G.; Furnell, S.: AndroDialysis: analysis of android intent effectiveness in malware detection. Comput. Secur. 65, 121–134 (2017)CrossRef Feizollah, A.; Anuar, N.B.; Salleh, R.; Suarez-Tangil, G.; Furnell, S.: AndroDialysis: analysis of android intent effectiveness in malware detection. Comput. Secur. 65, 121–134 (2017)CrossRef
28.
Zurück zum Zitat You-Joung, H.; Won-Bin, C.; Hyung-Woo, L.; Jaedeok, L.; Jeong Nyeo, K.: Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities. In: 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT), pp. 371–375 (2012). https://doi.org/10.1109/ICCSNT.2012.6525958 You-Joung, H.; Won-Bin, C.; Hyung-Woo, L.; Jaedeok, L.; Jeong Nyeo, K.: Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities. In: 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT), pp. 371–375 (2012). https://​doi.​org/​10.​1109/​ICCSNT.​2012.​6525958
30.
Zurück zum Zitat Park, Y.; Lee, C.; Lee, C.; Lim, J.; Han, S.; Park, M.; Cho, S.-J.: RGBDroid: a novel response-based approach to android privilege escalation attacks. In: Presented as part of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (2012). Park, Y.; Lee, C.; Lee, C.; Lim, J.; Han, S.; Park, M.; Cho, S.-J.: RGBDroid: a novel response-based approach to android privilege escalation attacks. In: Presented as part of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (2012).
33.
Zurück zum Zitat Meng, H.; Thing, V.L.; Cheng, Y.; Dai, Z.; Zhang, L.: A survey of Android exploits in the wild. Comput. Secur. 76, 71–91 (2018)CrossRef Meng, H.; Thing, V.L.; Cheng, Y.; Dai, Z.; Zhang, L.: A survey of Android exploits in the wild. Comput. Secur. 76, 71–91 (2018)CrossRef
34.
Zurück zum Zitat Xu, W.; Fu, Y.: Own Your Android! Yet Another Universal Root. In: WOOT 2015 Xu, W.; Fu, Y.: Own Your Android! Yet Another Universal Root. In: WOOT 2015
36.
Zurück zum Zitat Hojjati, A.; Adhikari, A.; Struckmann, K.; Chou, E.; Tho Nguyen, T.N.; Madan, K.; Winslett, M.S.; Gunter, C.A.; King, W.P.: Leave your phone at the door: Side channels that reveal factory floor secrets. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016, pp. 883–894. ACM Hojjati, A.; Adhikari, A.; Struckmann, K.; Chou, E.; Tho Nguyen, T.N.; Madan, K.; Winslett, M.S.; Gunter, C.A.; King, W.P.: Leave your phone at the door: Side channels that reveal factory floor secrets. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016, pp. 883–894. ACM
37.
Zurück zum Zitat Spreitzer, R.; Moonsamy, V.; Korak, T.; Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. (2018). Spreitzer, R.; Moonsamy, V.; Korak, T.; Mangard, S.: Systematic classification of side-channel attacks: a case study for mobile devices. (2018).
38.
Zurück zum Zitat Kadir, A.F.A.; Stakhanova, N.; Ghorbani, A.A.: Understanding android financial malware attacks: taxonomy, characterization, and challenges. J. Cyber Secur. Mob. 7(3), 1–52 (2018)CrossRef Kadir, A.F.A.; Stakhanova, N.; Ghorbani, A.A.: Understanding android financial malware attacks: taxonomy, characterization, and challenges. J. Cyber Secur. Mob. 7(3), 1–52 (2018)CrossRef
39.
Zurück zum Zitat Ward, B.: How Linux Works: What Every Superuser Should Know. No Starch Press, San Francisco (2014)MATH Ward, B.: How Linux Works: What Every Superuser Should Know. No Starch Press, San Francisco (2014)MATH
41.
Zurück zum Zitat Luyi, X., Xiaorui, P., Rui, W., Kan, Y., XiaoFeng, W.: Upgrading your android, elevating my malware: privilege escalation through mobile OS updating. In: 2014 IEEE Symposium on Security and Privacy (SP), 18–21 May 2014 2014, pp. 393–408 Luyi, X., Xiaorui, P., Rui, W., Kan, Y., XiaoFeng, W.: Upgrading your android, elevating my malware: privilege escalation through mobile OS updating. In: 2014 IEEE Symposium on Security and Privacy (SP), 18–21 May 2014 2014, pp. 393–408
46.
Zurück zum Zitat Casati, L., Visconti, A.: The dangers of rooting: data leakage detection in android applications. In: Mobile Information Systems 2018 (2018). Casati, L., Visconti, A.: The dangers of rooting: data leakage detection in android applications. In: Mobile Information Systems 2018 (2018).
47.
Zurück zum Zitat Alam, M., Cheng, Z., Vuong, S.: Context-aware multi-agent based framework for securing Android. In: 2014 International Conference on 2014 Multimedia Computing and Systems (ICMCS), pp. 961–966. IEEE Alam, M., Cheng, Z., Vuong, S.: Context-aware multi-agent based framework for securing Android. In: 2014 International Conference on 2014 Multimedia Computing and Systems (ICMCS), pp. 961–966. IEEE
51.
53.
Zurück zum Zitat Druffel, A.; Heid, K.: Davinci: Android app analysis beyond Frida via dynamic system call instrumentation. In: International Conference on Applied Cryptography and Network Security 2020, pp. 473–489. Springer Druffel, A.; Heid, K.: Davinci: Android app analysis beyond Frida via dynamic system call instrumentation. In: International Conference on Applied Cryptography and Network Security 2020, pp. 473–489. Springer
54.
Zurück zum Zitat Feizollah, A.; Anuar, N.B.; Salleh, R.; Amalina, F.: Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. In: 2014 4th International Symposium on Biometrics and Security Technologies, ISBAST 2014 2014, pp. 193–197. Institute of Electrical and Electronics Engineers Inc. Feizollah, A.; Anuar, N.B.; Salleh, R.; Amalina, F.: Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. In: 2014 4th International Symposium on Biometrics and Security Technologies, ISBAST 2014 2014, pp. 193–197. Institute of Electrical and Electronics Engineers Inc.
56.
Zurück zum Zitat Liaw, A.; Wiener, M.: Classification and regression by randomForest. R news 2(3), 18–22 (2002) Liaw, A.; Wiener, M.: Classification and regression by randomForest. R news 2(3), 18–22 (2002)
60.
Zurück zum Zitat Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 1, 1189–1232 (2001)MathSciNetMATH Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 1, 1189–1232 (2001)MathSciNetMATH
61.
Zurück zum Zitat Candel, A., Parmar, V., LeDell, E., Arora, A.: Deep Learning with H2O. H2O. ai Inc. (2016). Candel, A., Parmar, V., LeDell, E., Arora, A.: Deep Learning with H2O. H2O. ai Inc. (2016).
62.
Zurück zum Zitat Ng, S.S.Y., Zhu, W., Tang, W.W.S., Wan, L.C.H., Wat, A.Y.W.: An independent study of two deep learning platforms—H2O and SINGA. In: 2016 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 4–7 Dec. 2016 2016, pp. 1279–1283 Ng, S.S.Y., Zhu, W., Tang, W.W.S., Wan, L.C.H., Wat, A.Y.W.: An independent study of two deep learning platforms—H2O and SINGA. In: 2016 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 4–7 Dec. 2016 2016, pp. 1279–1283
63.
Zurück zum Zitat Richter, A.N., Khoshgoftaar, T.M., Landset, S., Hasanin, T.: A multi-dimensional comparison of toolkits for machine learning with big data. In: IEEE International Conference on Information Reuse and Integration (IRI), 2015 (2015). https://doi.org/10.1109/IRI.2015.12 Richter, A.N., Khoshgoftaar, T.M., Landset, S., Hasanin, T.: A multi-dimensional comparison of toolkits for machine learning with big data. In: IEEE International Conference on Information Reuse and Integration (IRI), 2015 (2015). https://​doi.​org/​10.​1109/​IRI.​2015.​12
64.
66.
Zurück zum Zitat Riondato, M., DeBrabant, J.A., Fonseca, R., Upfal, E.: PARMA: a parallel randomized algorithm for approximate association rules mining in MapReduce. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management (2012). https://doi.org/10.1145/2396761.2396776 Riondato, M., DeBrabant, J.A., Fonseca, R., Upfal, E.: PARMA: a parallel randomized algorithm for approximate association rules mining in MapReduce. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management (2012). https://​doi.​org/​10.​1145/​2396761.​2396776
67.
Zurück zum Zitat Meng, X.; Bradley, J.; Yavuz, B.; Sparks, E.; Venkataraman, S.; Liu, D.; Freeman, J.; Tsai, D.; Amde, M.; Owen, S.: Mllib: Machine learning in apache spark. J. Mach. Learn. Res. 17(34), 1–7 (2016)MathSciNetMATH Meng, X.; Bradley, J.; Yavuz, B.; Sparks, E.; Venkataraman, S.; Liu, D.; Freeman, J.; Tsai, D.; Amde, M.; Owen, S.: Mllib: Machine learning in apache spark. J. Mach. Learn. Res. 17(34), 1–7 (2016)MathSciNetMATH
68.
Zurück zum Zitat Morales, G.D.F.; Bifet, A.: SAMOA: scalable advanced massive online analysis. J. Mach. Learn. Res. 16, 149–153 (2015) Morales, G.D.F.; Bifet, A.: SAMOA: scalable advanced massive online analysis. J. Mach. Learn. Res. 16, 149–153 (2015)
69.
Zurück zum Zitat Ooi, B.C., Tan, K.-L., Wang, S., Wang, W., Cai, Q., Chen, G., Gao, J., Luo, Z., Tung, A.K., Wang, Y.: SINGA: A distributed deep learning platform. In: Proceedings of the 23rd ACM International Conference on Multimedia (2015). doi:https://doi.org/10.1145/2733373.2807410 Ooi, B.C., Tan, K.-L., Wang, S., Wang, W., Cai, Q., Chen, G., Gao, J., Luo, Z., Tung, A.K., Wang, Y.: SINGA: A distributed deep learning platform. In: Proceedings of the 23rd ACM International Conference on Multimedia (2015). doi:https://​doi.​org/​10.​1145/​2733373.​2807410
71.
Zurück zum Zitat Arnold, L., Rebecchi, S., Chevallier, S., Paugam-Moisy, H.: An introduction to deep learning. In: European Symposium on Artificial Neural Networks (ESANN) (2011). Arnold, L., Rebecchi, S., Chevallier, S., Paugam-Moisy, H.: An introduction to deep learning. In: European Symposium on Artificial Neural Networks (ESANN) (2011).
72.
Zurück zum Zitat Glorot, X., Bordes, A., Bengio, Y.: Deep Sparse Rectifier Neural Networks. In: Aistats 2011, vol. 106, p. 275 Glorot, X., Bordes, A., Bengio, Y.: Deep Sparse Rectifier Neural Networks. In: Aistats 2011, vol. 106, p. 275
73.
Zurück zum Zitat Ngiam, J., Coates, A., Lahiri, A., Prochnow, B., Le, Q.V., Ng, A.Y.: On optimization methods for deep learning. (2011) Ngiam, J., Coates, A., Lahiri, A., Prochnow, B., Le, Q.V., Ng, A.Y.: On optimization methods for deep learning. (2011)
74.
Zurück zum Zitat LeCun, Y.; Bengio, Y.; Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015)CrossRef LeCun, Y.; Bengio, Y.; Hinton, G.: Deep learning. Nature 521(7553), 436–444 (2015)CrossRef
75.
Zurück zum Zitat Bergstra, J.; Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13(Feb), 281–305 (2012)MathSciNetMATH Bergstra, J.; Bengio, Y.: Random search for hyper-parameter optimization. J. Mach. Learn. Res. 13(Feb), 281–305 (2012)MathSciNetMATH
76.
Zurück zum Zitat Bergstra, J.S., Bardenet, R., Bengio, Y., Kégl, B.: Algorithms for hyper-parameter optimization. In: Advances in Neural Information Processing Systems, pp. 2546–2554 (2011) Bergstra, J.S., Bardenet, R., Bengio, Y., Kégl, B.: Algorithms for hyper-parameter optimization. In: Advances in Neural Information Processing Systems, pp. 2546–2554 (2011)
77.
Zurück zum Zitat Friedman, J., Hastie, T., Tibshirani, R.: glmnet: Lasso and elastic-net regularized generalized linear models. R package version 1(4) (2009). Friedman, J., Hastie, T., Tibshirani, R.: glmnet: Lasso and elastic-net regularized generalized linear models. R package version 1(4) (2009).
78.
Zurück zum Zitat Tibshirani, R.: Regression shrinkage and selection via the lasso. J. R. Stat. Soc. Ser. B (Methodol.) 267–288 (1996). Tibshirani, R.: Regression shrinkage and selection via the lasso. J. R. Stat. Soc. Ser. B (Methodol.) 267–288 (1996).
81.
Zurück zum Zitat Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai 1995, vol. 2, pp. 1137–1145. Stanford, CA Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Ijcai 1995, vol. 2, pp. 1137–1145. Stanford, CA
82.
Zurück zum Zitat Guyon, I.: A scaling law for the validation-set training-set size ratio. AT & T Bell Laboratories, 80 (1997). Guyon, I.: A scaling law for the validation-set training-set size ratio. AT & T Bell Laboratories, 80 (1997).
83.
Zurück zum Zitat Feurer, M., Springenberg, J.T., Hutter, F.: Initializing Bayesian Hyperparameter Optimization via Meta-Learning. In: AAAI 2015, pp. 1128–1135 Feurer, M., Springenberg, J.T., Hutter, F.: Initializing Bayesian Hyperparameter Optimization via Meta-Learning. In: AAAI 2015, pp. 1128–1135
Metadaten
Titel
ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms
verfasst von
Wael F. Elsersy
Nor Badrul Anuar
Mohd Faizal Ab Razak
Publikationsdatum
26.06.2022
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 2/2023
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-022-06949-5

Weitere Artikel der Ausgabe 2/2023

Arabian Journal for Science and Engineering 2/2023 Zur Ausgabe

RESEARCH ARTICLE - SPECIAL ISSUE - Frontiers in Parallel Programming Models for Fog and Edge Computing Infrastructures

Synchronization Methods of Multiple High Frame Rate Industrial Cameras Using a General-Purpose Computer

RESEARCH ARTICLE - SPECIAL ISSUE - Frontiers in Parallel Programming Models for Fog and Edge Computing Infrastructures

Prewitt Logistic Deep Recurrent Neural Learning for Face Log Detection by Extracting Features from Images

Research Article-Computer Engineering and Computer Science

A Tuned Whale Optimization-Based Stacked-LSTM Network for Digital Image Segmentation

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.