DroidSieve: Fast and accurate classification of obfuscated android malware

Guillermo Suarez-Tangil, Santanu Kumar Dash, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

189 Citations (Scopus)
430 Downloads (Pure)

Abstract

With more than two million applications, Android marketplaces require automatic and scalable methods to efficiently vet apps for the absence of malicious threats. Recent techniques have successfully relied on the extraction of lightweight syntactic features suitable for machine learning classification, but despite their promising results, the very nature of such features suggest they would unlikely--on their own--be suitable for detecting obfuscated Android malware. To address this challenge, we propose DroidSieve, an Android malware classifier based on static analysis that is fast, accurate, and resilient to obfuscation. For a given app, DroidSieve first decides whether the app is malicious and, if so, classifies it as belonging to a family of related malware.

DroidSieve exploits obfuscation-invariant features and artifacts introduced by obfuscation mechanisms used in malware. At the same time, these purely static features are designed for processing at scale and can be extracted quickly.

For malware detection, we achieve up to 99.82% accuracy with zero false positives; for family identification of obfuscated malware, we achieve 99.26% accuracy at a fraction of the computational cost of state-of-the-art techniques.
Original languageEnglish
Title of host publicationACM on Conference on Data and Application Security and Privacy (CODASPY)
ISBN (Electronic)978-1-4503-4523-1
DOIs
Publication statusPublished - 22 Mar 2017

Fingerprint

Dive into the research topics of 'DroidSieve: Fast and accurate classification of obfuscated android malware'. Together they form a unique fingerprint.

Cite this