DroidGene: Detecting Android Malware Using Its Malicious Gene

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android is the most popular smartphone operating system in the world thanks to its openness, which also attracts many Android malware writers. It is really a big challenge for the various Android markets to filter out malware accurately and quickly before provisioning a large number of APPs. Many handcraft feature-based detection solutions had been proposed for solving this problem. But the malware writers can always find ways to change the features while maintaining the malware’ malicious semantic. Inspired by the findings in biology, we advocate identifying Android APPs’ genes that are responsible for the malicious behaviors. Based on this idea, we proposed a new method called DroidGene, which treats calling sequences and permissions as DNA, and using elaborately designed LSTM to find APPs’ malicious genes. The result of experiments on 16,200 Android samples shows that both the accuracy (99.1%) and the detection time (0.36 s) of DroidGene are superior to the state-of-the-art method.

Author supplied keywords

Cite

CITATION STYLE

APA

Wang, Y., & Zong, H. (2018). DroidGene: Detecting Android Malware Using Its Malicious Gene. In Communications in Computer and Information Science (Vol. 951, pp. 315–330). Springer Verlag. https://doi.org/10.1007/978-981-13-2826-8_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free