ANDROIDGYNY: Reviewing clustering techniques for Android malware family classification

Thalita Scharr Rodrigues Pimenta, Fabrício Ceschin, A. Grégio
{"title":"ANDROIDGYNY: Reviewing clustering techniques for Android malware family classification","authors":"Thalita Scharr Rodrigues Pimenta, Fabrício Ceschin, A. Grégio","doi":"10.1145/3587471","DOIUrl":null,"url":null,"abstract":"Thousands of malicious applications (apps) are daily created, modified with the aid of automation tools, and released on the World Wide Web. Several techniques have been applied over the years to identify whether an APK is malicious or not. The use of these techniques intends to identify unknown malware mainly by calculating the similarity of a sample with previously grouped, already known families of malicious apps. Thus, high rates of accuracy would enable several countermeasures: from further quick detection to the development of vaccines and aid for reverse engineering new variants. However, most of the literature consists of limited experiments—either short-term and offline or based exclusively on well-known malicious apps’ families. In this paper, we explore the use of malware phylogeny, a term borrowed from biology, consisting of the genealogical study of the relationship between elements and families. Also, we investigate the literature on clustering techniques applied to mobile malware classification and discuss how researchers have been setting up their experiments.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Threats: Research and Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3587471","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Thousands of malicious applications (apps) are daily created, modified with the aid of automation tools, and released on the World Wide Web. Several techniques have been applied over the years to identify whether an APK is malicious or not. The use of these techniques intends to identify unknown malware mainly by calculating the similarity of a sample with previously grouped, already known families of malicious apps. Thus, high rates of accuracy would enable several countermeasures: from further quick detection to the development of vaccines and aid for reverse engineering new variants. However, most of the literature consists of limited experiments—either short-term and offline or based exclusively on well-known malicious apps’ families. In this paper, we explore the use of malware phylogeny, a term borrowed from biology, consisting of the genealogical study of the relationship between elements and families. Also, we investigate the literature on clustering techniques applied to mobile malware classification and discuss how researchers have been setting up their experiments.
ANDROIDGYNY:回顾Android恶意软件家族分类的聚类技术
每天都有成千上万的恶意应用程序被创建,在自动化工具的帮助下被修改,并在万维网上发布。多年来,已经应用了几种技术来确定APK是否为恶意软件。使用这些技术主要是通过计算样本与先前分组的已知恶意应用程序家族的相似性来识别未知恶意软件。因此,高准确率将使若干对策成为可能:从进一步的快速检测到疫苗的开发以及对新变种的逆向工程提供帮助。然而,大多数文献都是由有限的实验组成的——要么是短期的,要么是离线的,要么是完全基于众所周知的恶意应用程序家族。在本文中,我们探讨了恶意软件系统发育的使用,这是一个从生物学借来的术语,包括对元素和家庭之间关系的系谱研究。此外,我们研究了应用于移动恶意软件分类的聚类技术的文献,并讨论了研究人员如何建立他们的实验。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信