scholarly journals Function Call Graph Score for Malware Detection

2015 ◽  
Author(s):  
Deebiga Rajeswaran
Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 186
Author(s):  
Yang Yang ◽  
Xuehui Du ◽  
Zhi Yang ◽  
Xing Liu

The openness of Android operating system not only brings convenience to users, but also leads to the attack threat from a large number of malicious applications (apps). Thus malware detection has become the research focus in the field of mobile security. In order to solve the problem of more coarse-grained feature selection and larger feature loss of graph structure existing in the current detection methods, we put forward a method named DGCNDroid for Android malware detection, which is based on the deep graph convolutional network. Our method starts by generating a function call graph for the decompiled Android application. Then the function call subgraph containing the sensitive application programming interface (API) is extracted. Finally, the function call subgraphs with structural features are trained as the input of the deep graph convolutional network. Thus the detection and classification of malicious apps can be realized. Through experimentation on a dataset containing 11,120 Android apps, the method proposed in this paper can achieve detection accuracy of 98.2%, which is higher than other existing detection methods.


2021 ◽  
Author(s):  
Chia-Yi Wu ◽  
Tao Ban ◽  
Shin-Ming Cheng ◽  
Bo Sun ◽  
Takeshi Takahashi

2013 ◽  
Vol 9 (1) ◽  
pp. 35-47 ◽  
Author(s):  
Ming Xu ◽  
Lingfei Wu ◽  
Shuhui Qi ◽  
Jian Xu ◽  
Haiping Zhang ◽  
...  

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 44652-44660
Author(s):  
Yipin Zhang ◽  
Xiaolin Chang ◽  
Yuzhou Lin ◽  
Jelena Misic ◽  
Vojislav B. Misic

2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Jinrong Bai ◽  
Qibin Shi ◽  
Shiguang Mu

The huge influx of malware variants are generated using packing and obfuscating techniques. Current antivirus software use byte signature to identify known malware, and this method is easy to be deceived and generally ineffective for identifying malware variants. Antivirus experts use hash signature to verify if captured sample is one of the malware databases, and this method cannot recognize malware variants whose hash signatures have changed completely. Function call graph is a high-level abstraction representation of a program and more stable and resilient than byte or hash signature. In this paper, function call graph is used as signature of a program, and two kinds of graph isomorphism algorithms are employed to identify known malware and its variants. Four experiments are designed to evaluate the performance of the proposed method. Experimental results indicate that the proposed method is effective and efficient for identifying known malware and a portion of their variants. The proposed method can also be used to index and locate a large-scale malware database and group malware to the corresponding family.


Sign in / Sign up

Export Citation Format

Share Document