Abstract:
The analysis of multiple Android malware families indicates malware instances within a common malware family always have similar call graph structures. Based on the isomo...Show MoreMetadata
Abstract:
The analysis of multiple Android malware families indicates malware instances within a common malware family always have similar call graph structures. Based on the isomorphism of sensitive API call graph, we propose a method which is used to construct malware family features via combining static analysis approach with graph similarity metric. The experiment is performed on a malware dataset which contains 1326 malware samples from 16 different malware families. The result shows that the method can differentiate distinct malware family features and divide suspect malware samples into corresponding families with a high accuracy of 96.77% overall and even defend a certain extent of obfuscation.
Date of Conference: 26-29 June 2017
Date Added to IEEE Xplore: 10 August 2017
ISBN Information: