MaskDroid: Robust Android Malware Detection with Masked Graph Representations

Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various tools employed in malware detection, graph representations (e.g., function call graphs) have played a pivotal role in characterizing the behavi...

Full description

Saved in:
Bibliographic Details
Published inIEEE/ACM International Conference on Automated Software Engineering : [proceedings] pp. 331 - 343
Main Authors Zheng, Jingnan, Liu, Jiaohao, Zhang, An, Zeng, Jun, Yang, Ziqi, Liang, Zhenkai, Chua, Tat-Seng
Format Conference Proceeding
LanguageEnglish
Published ACM 27.10.2024
Subjects
Online AccessGet full text
ISSN2643-1572
DOI10.1145/3691620.3695008

Cover

Loading…
Abstract Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various tools employed in malware detection, graph representations (e.g., function call graphs) have played a pivotal role in characterizing the behaviors of Android apps. However, though achieving impressive performance in malware detection, current state-of-the-art graph-based malware detectors are vulnerable to adversarial examples. These adversarial examples are meticulously crafted by introducing specific perturbations to normal malicious inputs. To defend against adversarial attacks, existing defensive mechanisms are typically supplementary additions to detectors and exhibit significant limitations, often relying on prior knowledge of adversarial examples and failing to defend against unseen types of attacks effectively.In this paper, we propose MaskDroid, a powerful detector with a strong discriminative ability to identify malware and remarkable robustness against adversarial attacks. Specifically, we introduce a masking mechanism into the Graph Neural Network (GNN) based framework, forcing MaskDroid to recover the whole input graph using a small portion (e.g., 20%) of randomly selected nodes. This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks. While capturing stable malicious semantics in the form of dependencies inside the graph structures, we further employ a contrastive module to encourage MaskDroid to learn more compact representations for both the benign and malicious classes to boost its discriminative power in detecting malware from benign apps and adversarial examples. Extensive experiments validate the robustness of MaskDroid against various adversarial attacks, showcasing its effectiveness in detecting malware in real-world scenarios comparable to state-of-the-art approaches.CCS CONCEPTS* Security and privacy → Malware and its mitigation.
AbstractList Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various tools employed in malware detection, graph representations (e.g., function call graphs) have played a pivotal role in characterizing the behaviors of Android apps. However, though achieving impressive performance in malware detection, current state-of-the-art graph-based malware detectors are vulnerable to adversarial examples. These adversarial examples are meticulously crafted by introducing specific perturbations to normal malicious inputs. To defend against adversarial attacks, existing defensive mechanisms are typically supplementary additions to detectors and exhibit significant limitations, often relying on prior knowledge of adversarial examples and failing to defend against unseen types of attacks effectively.In this paper, we propose MaskDroid, a powerful detector with a strong discriminative ability to identify malware and remarkable robustness against adversarial attacks. Specifically, we introduce a masking mechanism into the Graph Neural Network (GNN) based framework, forcing MaskDroid to recover the whole input graph using a small portion (e.g., 20%) of randomly selected nodes. This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks. While capturing stable malicious semantics in the form of dependencies inside the graph structures, we further employ a contrastive module to encourage MaskDroid to learn more compact representations for both the benign and malicious classes to boost its discriminative power in detecting malware from benign apps and adversarial examples. Extensive experiments validate the robustness of MaskDroid against various adversarial attacks, showcasing its effectiveness in detecting malware in real-world scenarios comparable to state-of-the-art approaches.CCS CONCEPTS* Security and privacy → Malware and its mitigation.
Author Yang, Ziqi
Liang, Zhenkai
Zheng, Jingnan
Liu, Jiaohao
Zhang, An
Chua, Tat-Seng
Zeng, Jun
Author_xml – sequence: 1
  givenname: Jingnan
  surname: Zheng
  fullname: Zheng, Jingnan
  email: jingnan.zheng@u.nus.edu
  organization: National University of Singapore,Singapore
– sequence: 2
  givenname: Jiaohao
  surname: Liu
  fullname: Liu, Jiaohao
  email: jiahao99@comp.nus.edu.sg
  organization: National University of Singapore,Singapore
– sequence: 3
  givenname: An
  surname: Zhang
  fullname: Zhang, An
  email: anzhang@u.nus.edu
  organization: National University of Singapore,Singapore
– sequence: 4
  givenname: Jun
  surname: Zeng
  fullname: Zeng, Jun
  email: junzeng@u.nus.edu
  organization: National University of Singapore,Singapore
– sequence: 5
  givenname: Ziqi
  surname: Yang
  fullname: Yang, Ziqi
  email: yangziqi@zju.edu.cn
  organization: Zhejing University China
– sequence: 6
  givenname: Zhenkai
  surname: Liang
  fullname: Liang, Zhenkai
  email: liangzk@comp.nus.edu.sg
  organization: National University of Singapore,Singapore
– sequence: 7
  givenname: Tat-Seng
  surname: Chua
  fullname: Chua, Tat-Seng
  email: chuats@comp.nus.edu.sg
  organization: National University of Singapore,Singapore
BookMark eNotjE1Lw0AURUdRsNas3biYP5D63nxm3JW2VqFBKLouM5MXGqxJyUSK_94GXZ174dx7y67ariXG7hFmiEo_SuPQCJidqQGKC5Y56woFYFGowl6yiTBK5qituGFZSk2Ac9QG0UxYWfr0uey7pnri2y58p4HP22rsvPSHk--JL2mgODRdy0_NsOfjgCq-7v1xz7d07ClRO_hRSHfsuvaHRNk_p-zjefW-eMk3b-vXxXyTe1G4Ia-VwlCZUEAdLWLQtSQhdVSxBi-jcqYCihQsgDAGrXDB6Rid0BpCrVFO2cPfb0NEu2PffPn-Z4dgjQYj5S-a-VAe
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1145/3691620.3695008
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9798400712487
EISSN 2643-1572
EndPage 343
ExternalDocumentID 10765063
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IM
6IN
6J9
AAJGR
AAWTH
ABLEC
ACREN
ADYOE
ADZIZ
AFYQB
ALMA_UNASSIGNED_HOLDINGS
AMTXH
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-a289t-f441bd6b80fc711b5f3e235c4cf0a3c496d0eceb7002661729b95cc92550bf513
IEDL.DBID RIE
IngestDate Wed Jan 15 06:20:39 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a289t-f441bd6b80fc711b5f3e235c4cf0a3c496d0eceb7002661729b95cc92550bf513
OpenAccessLink https://doi.org/10.1145/3691620.3695008
PageCount 13
ParticipantIDs ieee_primary_10765063
PublicationCentury 2000
PublicationDate 2024-Oct.-27
PublicationDateYYYYMMDD 2024-10-27
PublicationDate_xml – month: 10
  year: 2024
  text: 2024-Oct.-27
  day: 27
PublicationDecade 2020
PublicationTitle IEEE/ACM International Conference on Automated Software Engineering : [proceedings]
PublicationTitleAbbrev ASE
PublicationYear 2024
Publisher ACM
Publisher_xml – name: ACM
SSID ssib057256116
ssj0051577
Score 2.2861195
Snippet Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various...
SourceID ieee
SourceType Publisher
StartPage 331
SubjectTerms Adversarial Attacks
Android Malware Detection
Detectors
Graph Masking
Graph neural networks
Graph Representation
Malware
Perturbation methods
Prevention and mitigation
Privacy
Robustness
Security
Semantics
Software engineering
Title MaskDroid: Robust Android Malware Detection with Masked Graph Representations
URI https://ieeexplore.ieee.org/document/10765063
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LSsNAFB1sV67qo-KbWbhNnWReiVurFiFFioXuSmbmBqSSSpsg-PXOzUNFENwlgcAwyeScMznnXkKuuNAukTwKstjLVWFVHBghsiCMAcvTuRAiDDinUzWZi8eFXLRh9ToLAwC1-QxGeFj_y3drW-FWmV_h2hMKxXuk55VbE9bqXh6pPXiHyHWaz7DHaa3bWj6hkNdceSIUeY2qEsmwmeSPZio1ltwPyLQbRWMhWY2q0ozsx68Cjf8e5h4Zfsf26NMXIO2THSgOyKDr20DbZXxI0jTbrsab9Yu7obO1qbYlRV-jP6dp9vqebYCOoaw9WgXFjVqKN4CjD1jdms5q82ybWSq2QzK_v3u-nQRtW4Ug8-qqDHLPgIxTJma51WFoZM4h4tIKm7OMW5Eox8CC0ajPkOAkJpHWJl58MJPLkB-RfrEu4JhQx3OlmUMNmAlnkVxEChhzBoxSTJyQIU7P8q2pnLHsZub0j-tnZDfypAGxIdLnpF9uKrjwoF-ay_phfwLO8qoT
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwGA06H_RpXibezYOvnWlza311zqnrkLHB3kaTfAWZtLK1CP56k7ZTEQTf2kIhpE3POek534fQFWXSRJwGXhJaucq0CD3FWOL5IbjydMaHwAWc45EYTNnjjM-asHqVhQGAynwGXXdY_cs3uS7dVpld4dISCkE30ZYFfhbVca3168OlhW_fsZ36Q2yRWsqmmo_P-DUVlgoFVqWKiBPXTvJHO5UKTfptNFqPozaRLLplobr641eJxn8PdBd1voN7-PkLkvbQBmT7qL3u3ICbhXyA4jhZLXrL_MXc4HGuylWBnbPRnuM4eX1PloB7UFQurQy7rVrsbgCD7119azyu7LNNailbddC0fze5HXhNYwUvsfqq8FLLgZQRKiSplr6veEohoFwznZKEahYJQ0CDkk6hOYoTqYhrHVn5QVTKfXqIWlmewRHChqZCEuNUYMKMdvQiEECIUaCEIOwYddz0zN_q2hnz9cyc_HH9Em0PJvFwPnwYPZ2incBSCIcUgTxDrWJZwrmlAIW6qB78J-3DrWM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE%2FACM+International+Conference+on+Automated+Software+Engineering+%3A+%5Bproceedings%5D&rft.atitle=MaskDroid%3A+Robust+Android+Malware+Detection+with+Masked+Graph+Representations&rft.au=Zheng%2C+Jingnan&rft.au=Liu%2C+Jiaohao&rft.au=Zhang%2C+An&rft.au=Zeng%2C+Jun&rft.date=2024-10-27&rft.pub=ACM&rft.eissn=2643-1572&rft.spage=331&rft.epage=343&rft_id=info:doi/10.1145%2F3691620.3695008&rft.externalDocID=10765063