MaskDroid: Robust Android Malware Detection with Masked Graph Representations
Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various tools employed in malware detection, graph representations (e.g., function call graphs) have played a pivotal role in characterizing the behavi...
Saved in:
Published in | IEEE/ACM International Conference on Automated Software Engineering : [proceedings] pp. 331 - 343 |
---|---|
Main Authors | , , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
ACM
27.10.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2643-1572 |
DOI | 10.1145/3691620.3695008 |
Cover
Loading…
Abstract | Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various tools employed in malware detection, graph representations (e.g., function call graphs) have played a pivotal role in characterizing the behaviors of Android apps. However, though achieving impressive performance in malware detection, current state-of-the-art graph-based malware detectors are vulnerable to adversarial examples. These adversarial examples are meticulously crafted by introducing specific perturbations to normal malicious inputs. To defend against adversarial attacks, existing defensive mechanisms are typically supplementary additions to detectors and exhibit significant limitations, often relying on prior knowledge of adversarial examples and failing to defend against unseen types of attacks effectively.In this paper, we propose MaskDroid, a powerful detector with a strong discriminative ability to identify malware and remarkable robustness against adversarial attacks. Specifically, we introduce a masking mechanism into the Graph Neural Network (GNN) based framework, forcing MaskDroid to recover the whole input graph using a small portion (e.g., 20%) of randomly selected nodes. This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks. While capturing stable malicious semantics in the form of dependencies inside the graph structures, we further employ a contrastive module to encourage MaskDroid to learn more compact representations for both the benign and malicious classes to boost its discriminative power in detecting malware from benign apps and adversarial examples. Extensive experiments validate the robustness of MaskDroid against various adversarial attacks, showcasing its effectiveness in detecting malware in real-world scenarios comparable to state-of-the-art approaches.CCS CONCEPTS* Security and privacy → Malware and its mitigation. |
---|---|
AbstractList | Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various tools employed in malware detection, graph representations (e.g., function call graphs) have played a pivotal role in characterizing the behaviors of Android apps. However, though achieving impressive performance in malware detection, current state-of-the-art graph-based malware detectors are vulnerable to adversarial examples. These adversarial examples are meticulously crafted by introducing specific perturbations to normal malicious inputs. To defend against adversarial attacks, existing defensive mechanisms are typically supplementary additions to detectors and exhibit significant limitations, often relying on prior knowledge of adversarial examples and failing to defend against unseen types of attacks effectively.In this paper, we propose MaskDroid, a powerful detector with a strong discriminative ability to identify malware and remarkable robustness against adversarial attacks. Specifically, we introduce a masking mechanism into the Graph Neural Network (GNN) based framework, forcing MaskDroid to recover the whole input graph using a small portion (e.g., 20%) of randomly selected nodes. This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks. While capturing stable malicious semantics in the form of dependencies inside the graph structures, we further employ a contrastive module to encourage MaskDroid to learn more compact representations for both the benign and malicious classes to boost its discriminative power in detecting malware from benign apps and adversarial examples. Extensive experiments validate the robustness of MaskDroid against various adversarial attacks, showcasing its effectiveness in detecting malware in real-world scenarios comparable to state-of-the-art approaches.CCS CONCEPTS* Security and privacy → Malware and its mitigation. |
Author | Yang, Ziqi Liang, Zhenkai Zheng, Jingnan Liu, Jiaohao Zhang, An Chua, Tat-Seng Zeng, Jun |
Author_xml | – sequence: 1 givenname: Jingnan surname: Zheng fullname: Zheng, Jingnan email: jingnan.zheng@u.nus.edu organization: National University of Singapore,Singapore – sequence: 2 givenname: Jiaohao surname: Liu fullname: Liu, Jiaohao email: jiahao99@comp.nus.edu.sg organization: National University of Singapore,Singapore – sequence: 3 givenname: An surname: Zhang fullname: Zhang, An email: anzhang@u.nus.edu organization: National University of Singapore,Singapore – sequence: 4 givenname: Jun surname: Zeng fullname: Zeng, Jun email: junzeng@u.nus.edu organization: National University of Singapore,Singapore – sequence: 5 givenname: Ziqi surname: Yang fullname: Yang, Ziqi email: yangziqi@zju.edu.cn organization: Zhejing University China – sequence: 6 givenname: Zhenkai surname: Liang fullname: Liang, Zhenkai email: liangzk@comp.nus.edu.sg organization: National University of Singapore,Singapore – sequence: 7 givenname: Tat-Seng surname: Chua fullname: Chua, Tat-Seng email: chuats@comp.nus.edu.sg organization: National University of Singapore,Singapore |
BookMark | eNotjE1Lw0AURUdRsNas3biYP5D63nxm3JW2VqFBKLouM5MXGqxJyUSK_94GXZ174dx7y67ariXG7hFmiEo_SuPQCJidqQGKC5Y56woFYFGowl6yiTBK5qituGFZSk2Ac9QG0UxYWfr0uey7pnri2y58p4HP22rsvPSHk--JL2mgODRdy0_NsOfjgCq-7v1xz7d07ClRO_hRSHfsuvaHRNk_p-zjefW-eMk3b-vXxXyTe1G4Ia-VwlCZUEAdLWLQtSQhdVSxBi-jcqYCihQsgDAGrXDB6Rid0BpCrVFO2cPfb0NEu2PffPn-Z4dgjQYj5S-a-VAe |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1145/3691620.3695008 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9798400712487 |
EISSN | 2643-1572 |
EndPage | 343 |
ExternalDocumentID | 10765063 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IM 6IN 6J9 AAJGR AAWTH ABLEC ACREN ADYOE ADZIZ AFYQB ALMA_UNASSIGNED_HOLDINGS AMTXH BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL |
ID | FETCH-LOGICAL-a289t-f441bd6b80fc711b5f3e235c4cf0a3c496d0eceb7002661729b95cc92550bf513 |
IEDL.DBID | RIE |
IngestDate | Wed Jan 15 06:20:39 EST 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a289t-f441bd6b80fc711b5f3e235c4cf0a3c496d0eceb7002661729b95cc92550bf513 |
OpenAccessLink | https://doi.org/10.1145/3691620.3695008 |
PageCount | 13 |
ParticipantIDs | ieee_primary_10765063 |
PublicationCentury | 2000 |
PublicationDate | 2024-Oct.-27 |
PublicationDateYYYYMMDD | 2024-10-27 |
PublicationDate_xml | – month: 10 year: 2024 text: 2024-Oct.-27 day: 27 |
PublicationDecade | 2020 |
PublicationTitle | IEEE/ACM International Conference on Automated Software Engineering : [proceedings] |
PublicationTitleAbbrev | ASE |
PublicationYear | 2024 |
Publisher | ACM |
Publisher_xml | – name: ACM |
SSID | ssib057256116 ssj0051577 |
Score | 2.2861195 |
Snippet | Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 331 |
SubjectTerms | Adversarial Attacks Android Malware Detection Detectors Graph Masking Graph neural networks Graph Representation Malware Perturbation methods Prevention and mitigation Privacy Robustness Security Semantics Software engineering |
Title | MaskDroid: Robust Android Malware Detection with Masked Graph Representations |
URI | https://ieeexplore.ieee.org/document/10765063 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LSsNAFB1sV67qo-KbWbhNnWReiVurFiFFioXuSmbmBqSSSpsg-PXOzUNFENwlgcAwyeScMznnXkKuuNAukTwKstjLVWFVHBghsiCMAcvTuRAiDDinUzWZi8eFXLRh9ToLAwC1-QxGeFj_y3drW-FWmV_h2hMKxXuk55VbE9bqXh6pPXiHyHWaz7DHaa3bWj6hkNdceSIUeY2qEsmwmeSPZio1ltwPyLQbRWMhWY2q0ozsx68Cjf8e5h4Zfsf26NMXIO2THSgOyKDr20DbZXxI0jTbrsab9Yu7obO1qbYlRV-jP6dp9vqebYCOoaw9WgXFjVqKN4CjD1jdms5q82ybWSq2QzK_v3u-nQRtW4Ug8-qqDHLPgIxTJma51WFoZM4h4tIKm7OMW5Eox8CC0ajPkOAkJpHWJl58MJPLkB-RfrEu4JhQx3OlmUMNmAlnkVxEChhzBoxSTJyQIU7P8q2pnLHsZub0j-tnZDfypAGxIdLnpF9uKrjwoF-ay_phfwLO8qoT |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bS8MwGA06H_RpXibezYOvnWlza311zqnrkLHB3kaTfAWZtLK1CP56k7ZTEQTf2kIhpE3POek534fQFWXSRJwGXhJaucq0CD3FWOL5IbjydMaHwAWc45EYTNnjjM-asHqVhQGAynwGXXdY_cs3uS7dVpld4dISCkE30ZYFfhbVca3168OlhW_fsZ36Q2yRWsqmmo_P-DUVlgoFVqWKiBPXTvJHO5UKTfptNFqPozaRLLplobr641eJxn8PdBd1voN7-PkLkvbQBmT7qL3u3ICbhXyA4jhZLXrL_MXc4HGuylWBnbPRnuM4eX1PloB7UFQurQy7rVrsbgCD7119azyu7LNNailbddC0fze5HXhNYwUvsfqq8FLLgZQRKiSplr6veEohoFwznZKEahYJQ0CDkk6hOYoTqYhrHVn5QVTKfXqIWlmewRHChqZCEuNUYMKMdvQiEECIUaCEIOwYddz0zN_q2hnz9cyc_HH9Em0PJvFwPnwYPZ2incBSCIcUgTxDrWJZwrmlAIW6qB78J-3DrWM |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IEEE%2FACM+International+Conference+on+Automated+Software+Engineering+%3A+%5Bproceedings%5D&rft.atitle=MaskDroid%3A+Robust+Android+Malware+Detection+with+Masked+Graph+Representations&rft.au=Zheng%2C+Jingnan&rft.au=Liu%2C+Jiaohao&rft.au=Zhang%2C+An&rft.au=Zeng%2C+Jun&rft.date=2024-10-27&rft.pub=ACM&rft.eissn=2643-1572&rft.spage=331&rft.epage=343&rft_id=info:doi/10.1145%2F3691620.3695008&rft.externalDocID=10765063 |