DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis

Research output: Contribution to journalArticlepeer-review

136 Scopus citations

Abstract

With the exponential growth of smartphone adoption, malware attacks on smartphones have resulted in serious threats to users, especially those on popular platforms, such as Android. Most Android malware is generated by piggybacking malicious payloads into benign applications (apps), which are called piggybacked apps. In this paper, we propose DAPASA, an approach to detect Android piggybacked apps through sensitive subgraph analysis. Two assumptions are established to reflect the different invocation patterns of sensitive APIs in the injected malicious payloads (rider) of a piggybacked app and in its host app (carrier). With these two assumptions, DAPASA generates a sensitive subgraph (SSG) to profile the most suspicious behavior of an app. Five features are constructed from SSG to depict the invocation patterns. The five features are fed into the machine learning algorithms to detect whether the app is piggybacked or benign. DAPASA is evaluated on a large real-world data set consisting of 2551 piggybacked apps and 44 921 popular benign apps. Extensive evaluation results demonstrate that the proposed approach exhibits an impressive detection performance compared with that of three baseline approaches even with only five numeric features. Furthermore, the proposed approach can complement permission-based approaches and API-based approaches with the combination of our five features from a new perspective of the invocation structure.

Original languageEnglish
Article number7887707
Pages (from-to)1772-1785
Number of pages14
JournalIEEE Transactions on Information Forensics and Security
Volume12
Issue number8
DOIs
StatePublished - Aug 2017

Keywords

  • Piggybacked apps
  • malware detection
  • sensitive API
  • sensitive subgraph
  • static analysis

Fingerprint

Dive into the research topics of 'DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis'. Together they form a unique fingerprint.

Cite this