AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection

A Feizollah, NB Anuar, R Salleh, G Suarez-Tangil, S Furnell

Research output: Contribution to journalArticlepeer-review

1 Downloads (Pure)

Abstract

The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-party applications running on top of any Android device. Inter-process communication is one of the most notable features of the Android framework as it allows the reuse of components across process boundaries. This mechanism is used as gateway to access different sensitive services in the Android framework. In the Android platform, this communication system is usually driven by a late runtime binding messaging object known as Intent. In this paper, we evaluate the effectiveness of Android Intents (explicit and implicit) as a distinguishing feature for identifying malicious applications. We show that Intents are semantically rich features that are able to encode the intentions of malware when compared to other well-studied features such as permissions. We also argue that this type of feature is not the ultimate solution. It should be used in conjunction with other known features. We conducted experiments using a dataset containing 7406 applications that comprise 1846 clean and 5560 infected applications. The results show detection rate of 91% using Android Intent against 83% using Android permission. Additionally, experiment on combination of both features results in detection rate of 95.5%.
Original languageEnglish
Number of pages0
JournalCOMPUTERS & SECURITY
Volume0
Issue number0
Early online date16 Nov 2016
DOIs
Publication statusPublished - Mar 2017

Fingerprint

Dive into the research topics of 'AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection'. Together they form a unique fingerprint.

Cite this