Using G Features to Improve the Efficiency of Function Call Graph Based Android Malware Detection

2018 ◽  
Vol 103 (4) ◽  
pp. 2947-2955 ◽  
Author(s):  
Yu Liu ◽  
Liqiang Zhang ◽  
Xiangdong Huang
Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 186
Author(s):  
Yang Yang ◽  
Xuehui Du ◽  
Zhi Yang ◽  
Xing Liu

The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.


2020 ◽  
Vol 1693 ◽  
pp. 012080
Author(s):  
Tong Lu ◽  
Xiaoyuan Liu ◽  
Jingwei Chen ◽  
Naitian Hu ◽  
Bo Liu

2021 ◽  
Vol 423 ◽  
pp. 301-307
Author(s):  
Minghui Cai ◽  
Yuan Jiang ◽  
Cuiying Gao ◽  
Heng Li ◽  
Wei Yuan

Sign in / Sign up

Export Citation Format

Share Document