ByteDroid: Android Malware Detection Using Deep Learning on Bytecode Sequences

14Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The explosive growth of the Android malware poses a great threat to users’ privacy and sensitive personal information. It is urgent to develop an effective and efficient Android malware detection system. Existing studies usually require the manual feature engineering for the feature extraction. In fact, the detection performance is heavily relied on the quality of the feature extraction. Additionally, the feature extraction becomes extremely difficult in the malware detection due to the fact that malware developers often deploy the obfuscation techniques. To address this issue, we focus on the Android malware detection using the deep neural networks without the human factors. In this paper, we propose ByteDroid, an Android malware detection scheme that processes the raw Dalvik bytecode using the deep learning. ByteDroid resizes the raw bytecode and constructs a learnable vector representation as the input to the neural network. Then, ByteDroid adopts a Convolutional Neural Networks (CNNs) to automatically extract the malware features and perform the classification. Our experiment results demonstrate that ByteDroid not only can effectively detect Android malware, but also has a great generalization performance given untrained malware. Moreover, ByteDroid maintains resilience to obfuscation techniques.

Cite

CITATION STYLE

APA

Zou, K., Luo, X., Liu, P., Wang, W., & Wang, H. (2020). ByteDroid: Android Malware Detection Using Deep Learning on Bytecode Sequences. In Communications in Computer and Information Science (Vol. 1149 CCIS, pp. 159–176). Springer. https://doi.org/10.1007/978-981-15-3418-8_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free