Obfuscating Function Call Topography to Test Structural Malware Detection against Evasion Attacks

dc.contributor.authorCholiy, Andrew
dc.contributor.authorLi, Feng
dc.contributor.authorGao, Tianchong
dc.contributor.departmentComputer Information and Graphics Technology, School of Engineering and Technologyen_US
dc.date.accessioned2017-12-14T19:47:20Z
dc.date.available2017-12-14T19:47:20Z
dc.date.issued2017-01
dc.description.abstractThe incredible popularity of the Android mobile operating system has resulted in a massive influx of malicious applications for the platform. This malware can come from a number of sources as Google allows the installation of Android App Packages (APKs) from third parties. Even within its own Google Play storefront, however, malicious software can be found. One type of approach to identify malware focuses on the structural properties of the function call graphs (FCGs) extracted from APKs. The aim of this research work is to test the robustness of one example method in this category, named the ACTS (App topologiCal signature through graphleT Sampling) method. By extracting graphlet statistics from a FCG, the ACTS approach is able to efficiently differentiate between benign app samples and malware with good accuracy. In this work, we obfuscate the FCG of malware in several ways, and test the ACTs method against these evasion attacks. The statistical results of running ACTS against unmodified real malware samples is compared with the results of ACTS running against obfuscated versions of those same apps.en_US
dc.eprint.versionAuthor's manuscripten_US
dc.identifier.citationCholiy, A., Li, F., & Gao, T. (2017). Obfuscating function call topography to test structural malware detection against evasion attacks. In 2017 International Conference on Computing, Networking and Communications (ICNC) (pp. 808–813). https://doi.org/10.1109/ICCNC.2017.7876235en_US
dc.identifier.urihttps://hdl.handle.net/1805/14826
dc.language.isoenen_US
dc.publisherIEEEen_US
dc.relation.isversionof10.1109/ICCNC.2017.7876235en_US
dc.relation.journal2017 International Conference on Computing, Networking and Communicationsen_US
dc.rightsPublisher Policyen_US
dc.sourceAuthoren_US
dc.subjectmalwareen_US
dc.subjectandroidsen_US
dc.subjecthumanoid robotsen_US
dc.titleObfuscating Function Call Topography to Test Structural Malware Detection against Evasion Attacksen_US
dc.typeConference proceedingsen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Choliy-2017-Obfuscating.pdf
Size:
1.07 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.99 KB
Format:
Item-specific license agreed upon to submission
Description: