Rodrigo Lemos, Tiago Heinrich, N. C. Will, R. Obelheiro, C. Maziero
{"title":"Inspecting Binder Transactions to Detect Anomalies in Android","authors":"Rodrigo Lemos, Tiago Heinrich, N. C. Will, R. Obelheiro, C. Maziero","doi":"10.1109/SysCon53073.2023.10131073","DOIUrl":null,"url":null,"abstract":"With the growing number and complexity of threats to mobile devices in the latest years, new security strategies are constantly developed to protect the users. The wide variety of Android malware families makes it challenging to keep up with malware evolution and build detection systems that are generic enough to deal with them. This work explores inter-process communication (IPC) between Android processes for anomaly detection. All IPC messages in Android go through the Binder driver, making it a good vantage point to observe all kinds of malicious actions. We observed how malicious and benign applications interact with Binder and built a dataset representing their behavior. We enriched the raw dataset by classifying Binder calls into five groups according to their functionality and by identifying high- and low-risk groups. These new features were used in a machine learning-based method to detect malware on Android and validate it using these datasets, achieving accuracy and F1Score close to 0.90.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Systems Conference (SysCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SysCon53073.2023.10131073","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the growing number and complexity of threats to mobile devices in the latest years, new security strategies are constantly developed to protect the users. The wide variety of Android malware families makes it challenging to keep up with malware evolution and build detection systems that are generic enough to deal with them. This work explores inter-process communication (IPC) between Android processes for anomaly detection. All IPC messages in Android go through the Binder driver, making it a good vantage point to observe all kinds of malicious actions. We observed how malicious and benign applications interact with Binder and built a dataset representing their behavior. We enriched the raw dataset by classifying Binder calls into five groups according to their functionality and by identifying high- and low-risk groups. These new features were used in a machine learning-based method to detect malware on Android and validate it using these datasets, achieving accuracy and F1Score close to 0.90.