MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph

  • Wenjun Hu
  • , Jing Tao
  • , Xiaobo Ma
  • , Wenyu Zhou
  • , Shuang Zhao
  • , Ting Han

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

34 Scopus citations

Abstract

With the increasing popularity of Android platform, Android malware, especially APP-Repackaging malware wherein the malicious code is injected into legitimate Android applications, is spreading rapidly. This paper proposes a new system named MIGDroid, which leverages method invocation graph based static analysis to detect APP-Repackaging Android malware. The method invocation graph reflects the 'interaction' connections between different methods. Such graph can be naturally exploited to detect APP-Repackaging malware because the connections between injected malicious code and legitimate applications are expected to be weak. Specifically, MIGDroid first constructs method invocation graph on the smali code level, and then divides the method invocation graph into weakly connected sub-graphs. To determine which sub-graph corresponds to the injected malicious code, the threat score is calculated for each sub-graph based on the invoked sensitive APIs, and the subgraphs with higher scores will be more likely to be malicious. Experiment results based on 1,260 Android malware samples in the real world demonstrate the specialty of our system in detecting APP-Repackaging Android malware, thereby well complementing existing static analysis systems (e.g., Androguard) that do not focus on APP-Repackaging Android malware.

Original languageEnglish
Title of host publication2014 23rd International Conference on Computer Communication and Networks, ICCCN Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479935727
DOIs
StatePublished - 25 Sep 2014
Event2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014 - Shanghai, China
Duration: 4 Aug 20147 Aug 2014

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
ISSN (Print)1095-2055

Conference

Conference2014 23rd International Conference on Computer Communication and Networks, ICCCN 2014
Country/TerritoryChina
CityShanghai
Period4/08/147/08/14

Keywords

  • Android
  • malware
  • method invocation graph
  • static analysis

Fingerprint

Dive into the research topics of 'MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph'. Together they form a unique fingerprint.

Cite this