论文:2020,Vol:38,Issue(5):965-970
引用本文:
管峻, 刘慧英, 毛保磊, 蒋煦. 基于API配对的Android恶意应用检测[J]. 西北工业大学学报
GUAN Jun, LIU Huiying, MAO Baolei, JIANG Xu. Android Malware Detection Based on API Pairing[J]. Northwestern polytechnical university

基于API配对的Android恶意应用检测
管峻1, 刘慧英1, 毛保磊1,2, 蒋煦1
1. 西北工业大学 自动化学院, 陕西 西安 710072;
2. 郑州大学, 河南 郑州 450000
摘要:
针对基于Android应用程序申请权限的检测过于粗粒度的问题,提出了基于敏感应用程序编程接口(application program interface,API)配对的恶意应用检测方法。通过反编译应用程序提取危险权限对应的敏感API,将敏感API两两配对分别构建恶意应用无向图与良性应用无向图,再根据恶意应用和良性应用在敏感API调用上的差异分配相同边不同的权重,以此检测Android恶意应用。实验结果表明,提出的方法可以有效地检测出Android恶意应用程序,具有现实意义。
关键词:    安卓系统    权限    应用程序编程接口    恶意应用   
Android Malware Detection Based on API Pairing
GUAN Jun1, LIU Huiying1, MAO Baolei1,2, JIANG Xu1
1. School of Automation, Northwestern Polytechnical University, Xi'an 710072, China;
2. Zhengzhou University, Zhengzhou 450000, China
Abstract:
Aiming at the problem that the permission-based detection is too coarse-grained, a malware detection method based on sensitive application program interface(API) pairing is proposed. The method decompiles the application to extract the sensitive APIs corresponding to the dangerous permissions, and uses the pairing of the sensitive APIs to construct the undirected graph of malicious applications and undirected graph of benign applications. According to the importance of sensitive APIs in malware and benign applications, different weights on the same edge in the different graphs are assigned to detect Android malicious applications. Experimental results show that the proposed method can effectively detect Android malicious applications and has practical significance.
Key words:    Android    permission    application program interface (API)    malware detection   
收稿日期: 2019-12-28     修回日期:
DOI: 10.1051/jnwpu/20203850965
基金项目: 河南省高等学校重点科研项目(21A520041)资助
通讯作者:     Email:
作者简介: 管峻(1983-),西北工业大学博士研究生,主要从事信息安全研究。
相关功能
PDF(1651KB) Free
打印本文
把本文推荐给朋友
作者相关文章
管峻  在本刊中的所有文章
刘慧英  在本刊中的所有文章
毛保磊  在本刊中的所有文章
蒋煦  在本刊中的所有文章

参考文献:
[1] IDC. Smartphone Market Share[EB/OL]. (2019-01-24)[2019-11-12]. https://www.idc.com/promo/smartphone-market-share/os
[2] 中国互联网协会. 2019年中国网民权益保护调查报告[EB/OL]. (2019-05-29)[2019-11-02]. https://max.book118.com/html/2019/0630/813513211700203-2.shtm
[3] KABAKUS A T. What Static Analysis Can Utmost Offer for Android Malware Detection[J]. Information Technology and Control, 2019, 48(2):235-249
[4] HE Y, YANG X, HU B, et al. Dynamic Privacy Leakage Analysis of Android Third-Party Libraries[J]. Journal of Information Security and Applications, 2019, 46:259-270
[5] FARUKI P, BHARMAL A, LAXMI V, et al. Android Security:A Survey of Issues, Malware Penetration, and Defenses[J]. IEEE Communications Surveys & Tutorials, 2017, 17(2):998-1022
[6] ARORA A, PEDDOJU S K, CONTI M. PermPair:Android Malware Detection using Permission Pairs[J]. IEEE Trans on Information Forensics and Security, 2020, 15:1968-1982
[7] LIANG S, DU X. Permission-Combination-Based Scheme for Android Mobile Malware Detection[C]//Proceedings of the 2014 International Conference on Communications,Sydney, 2014:2301-2306
[8] MIRZAEI O, SUAREZ-TANGIL G, DE FUENTES J M, et al. Andrensemble:Leveraging Api Ensembles to Characterize Android Malware Families[C]//Proceedings of the 14th ACM Asia Conference on Computer and Communications Security, Aucland, 2019:307-314
[9] ZHOU H, ZHANG W, WEI F, et al. Analysis of Android Malware Family Characteristic Based on Isomorphism of Sensitive API Call Graph[C]//Proceedings of the 2nd International Conference on Data Science in Cyberspace(DSC), Shenzhen, 2017:319-327
[10] TAO G, ZHENG Z, GUO Z, et al. MalPat:Mining Patterns of Malicious and Benign Android Apps via Permission-Related APIs[J]. IEEE Trans on Reliability, 2018, 67(99):355-369