Learning and Verifying Unwanted Behaviours
نویسندگان
چکیده
Unwanted behaviours, such as interception and forwarding of incoming messages, have been repeatedly seen in Android malware. We study the problem of learning unwanted behaviours from malware instances and verifying the application in question to deny these behaviours. We approximate an application’s behaviours by an automaton, i.e., finite control-sequences of events, actions, and annotated API calls, and develop an e cient machine-learning-centred method to construct and choose abstract sub-automata, to characterise unwanted behaviours exhibited in hundreds and thousands of malware instances. By taking the verification results against unwanted behaviours as input features, we show that the performance of detecting new malware is improved dramatically, in particular, the precision and recall are respectively 8% and 51% better than those using API calls and permissions, which are the best performing features known so far. This is the first automatic approach to generate unwanted behaviours for machine-learning-based Android malware detection. We also demonstrate unwanted behaviours constructed for well-known malware families. They compare well to those described in human-authorised descriptions of these families.
منابع مشابه
On Robust Malware Classifiers by Verifying Unwanted Behaviours
Machine-learning-based Android malware classifiers perform badly on the detection of new malware, in particular, when they take API calls and permissions as input features, which are the best performing features known so far. This is mainly because signature-based features are very sensitive to the training data and cannot capture general behaviours of identified malware. To improve the robustn...
متن کاملExplaining Unwanted Behaviours in Context
Mobile malware has been increasingly identified based on unwanted behaviours like sending premium SMS messages. However, unwanted behaviours for a group of apps can be normal for another, i.e., they are contextsensitive. We develop an approach to automatically explain unwanted behaviours in context and evaluate the automatic explanations via a user-study with favourable results. These explanati...
متن کاملFarmer Behaviours and Sustainable Water Management in Semiarid Konya Closed Basin in Turkey
Objective: This study aims to review group learning method effect compared to individual learning method on dyslexic students of second grade in elementary school and it evaluates whether their problem will be solved in group and by other`s help? Thus, two methods of learning- Jigsaw I and Jigsaw II methods -were used to review their effects on improving learning and reading of...
متن کاملHierarchical Reinforcement Learning: A Hybrid Approach
In this thesis we investigate the relationships between the symbolic and subsymbolic methods used for controlling agents by artificial intelligence, focusing in particular on methods that learn. In light of the strengths and weaknesses of each approach, we propose a hybridisation of symbolic and subsymbolic methods to capitalise on the best features of each. We implement such a hybrid system, c...
متن کاملFarmer Behaviours and Sustainable Water Management in Semiarid Konya Closed Basin in Turkey
Objective: This study aims to review group learning method effect compared to individual learning method on dyslexic students of second grade in elementary school and it evaluates whether their problem will be solved in group and by other`s help? Thus, two methods of learning- Jigsaw I and Jigsaw II methods -were used to review their effects on improving learning and reading of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016