Busca avançada
Ano de início
Entree
(Referência obtida automaticamente do Web of Science, por meio da informação sobre o financiamento pela FAPESP e o número do processo correspondente, incluída na publicação pelos autores.)

Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems

Texto completo
Autor(es):
Navarro, Luiz C. [1] ; Navarro, Alexandre K. W. [2] ; Gregio, Andre [3] ; Rocha, Anderson [1] ; Dahab, Ricardo [1]
Número total de Autores: 5
Afiliação do(s) autor(es):
[1] Univ Campinas UNICAMP, Inst Comp, Campinas, SP - Brazil
[2] Univ Cambridge, Engn Dept, Cambridge - England
[3] Fed Univ Parana UFPR, Dept Informat, Curitiba, PR - Brazil
Número total de Afiliações: 3
Tipo de documento: Artigo de Revisão
Fonte: COMPUTERS & SECURITY; v. 78, p. 429-453, SEP 2018.
Citações Web of Science: 4
Resumo

Smartphones form a complex application ecosystem with a myriad of components, properties, and interfaces that produce an intricate relationship network. Given the intrinsic complexity of this system, we hereby propose two main contributions. First, we devise a methodology to systematically determine and analyze the complex relationship network among components, properties, and interfaces associated with the permission mechanism in Android ecosystems. Second, we investigate whether it is possible to identify characteristics shared by malware samples at this high level of abstraction that could be leveraged to unveil their presence. We propose an ontology-based framework to model the relationships between application and system elements, together with a machine-learning approach to analyze the complex network that arises therefrom. We represent the ontological model for the considered Android ecosystem with 4570 apps through a graph with some 55,000 nodes and 120,000 edges. Experiments have shown that a classifier operating on top of this complex representation can achieve an accuracy of 88% and precision of 91% and is capable of identifying and determining 24 features that correspond to 70 important graph nodes related to malware activity, which is a remarkable feat for security. (C) 2018 Elsevier Ltd. All rights reserved. (AU)

Processo FAPESP: 17/12646-3 - Déjà vu: coerência temporal, espacial e de caracterização de dados heterogêneos para análise e interpretação de integridade
Beneficiário:Anderson de Rezende Rocha
Modalidade de apoio: Auxílio à Pesquisa - Temático