AIM: An Android Interpretable Malware detector based on application class modeling

Smartphones are one of the IoT gadgets that have revolutionized our lives. Perhaps the most significant threat that endangers the security of smartphones is mobile malware. Despite the recent efforts to combat smartphone malware, it remains one of the significant challenges in smartphone security. M...

Full description

Saved in:
Bibliographic Details
Published inJournal of information security and applications Vol. 75; p. 103486
Main Authors Faghihi, Farnood, Zulkernine, Mohammad, Ding, Steven
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.06.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Smartphones are one of the IoT gadgets that have revolutionized our lives. Perhaps the most significant threat that endangers the security of smartphones is mobile malware. Despite the recent efforts to combat smartphone malware, it remains one of the significant challenges in smartphone security. Modern smartphone malware is complex and growing at a rapid pace. Thus, techniques based on machine learning have gained significant popularity in recent years. However, most of the existing methods fail to provide enough interpretability regarding their decisions. In other words, if an application is classified as malicious, it is not clear which part of the application is performing the malicious behavior. In this work, we address this gap by presenting an Android Interpretable Malware detection method (AIM) based on application class modeling. AIM utilizes hybrid analysis and a neural network classifier to distinguish malware from benign applications. Furthermore, AIM identifies malicious parts of malware applications by utilizing a novel class modeling approach based on used APIs and employing the attention mechanism. We implement AIM and evaluate its performance on up-to-date benchmark datasets. We also compare the results obtained by the proposed technique with others and investigate the impact of several feature sets on it. The results indicate that AIM outperforms most of the existing methods with an accuracy of more than 98.9% and correctly highlights malicious code snippets inside applications.
ISSN:2214-2126
DOI:10.1016/j.jisa.2023.103486