【24h】

Detection of repackaged Android Malware

机译:检测重新包装的Android恶意软件

获取原文

摘要

Android applications are widely used by millions of users to perform many activities. Unfortunately, legitimate and popular applications are targeted by malware authors and they repackage the existing applications by injecting additional code intended to perform malicious activities without the knowledge of end users. Thus, it is important to validate applications for possible repackaging before their installation to safeguard end users. This paper presents the detection of repackaged malware application based on Kullback-Leibler Divergence (KLD) metric. Our approach builds the population distribution of a legitimate and suspected repackaged malware application based on a set of Small opcode. A high KLD value indicates that an application is dissimilar compared to an original application, hence likely a repackaged application. The approach has been validated based on real-world malware samples and repackaging them to a legitimate application. The results indicate that KLD values remain high for all the malware when repackaged within a legitimate application, and hence can be used as a suitable metric for detection of new malware.
机译:数以百万计的用户广泛使用Android应用程序来执行许多活动。不幸的是,合法和流行的应用程序受到恶意软件作者的攻击,它们通过注入旨在在不了解最终用户的情况下执行恶意活动的其他代码来对现有应用程序进行重新打包。因此,重要的是在安装应用程序之前验证应用程序是否可能进行重新包装,以保护最终用户。本文提出了基于Kullback-Leibler Divergence(KLD)度量标准的重新打包恶意软件应用程序的检测。我们的方法基于一组Small Opcode构建合法的和可疑的重新打包的恶意软件应用程序的总体分布。高KLD值表示与原始应用程序相比,该应用程序与原始应用程序不同,因此可能是重新打包的应用程序。该方法已经根据实际的恶意软件样本进行了验证,并将其重新打包到合法的应用程序中。结果表明,当将所有恶意软件重新打包到合法应用程序中时,其KLD值仍然很高,因此可以用作检测新恶意软件的合适指标。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号