Back to Search
Start Over
SFCGDroid: android malware detection based on sensitive function call graph.
- Source :
-
International Journal of Information Security . Oct2023, Vol. 22 Issue 5, p1115-1124. 10p. - Publication Year :
- 2023
-
Abstract
- Android is now one of the most popular operating systems in the world because of its open source character, so the threshold for hackers to make malware has also become lower, and more and more malware has started to threaten people's lives. Graphs are used to represent the program's syntactic and semantic structure, and can naturally represent malicious behavior, so we propose a malware detection method named SFCGDroid, which based on sensitive function call graph, so we propose a malware detection method named SFCGDroid, which based on sensitive function call graph. We first decompile the Android application to generate a function call graph (FCG), and extract the sensitive function call graph (SFCG) on the FCG. Secondly, we extract two class features (1) use the Skip-gram model to obtain function embeddings, and (2) treat the SFCG as a social network and extract the triads attribute of the sensitive API. The two types of features are combined as a feature representation of the SFCG and fed into a graph convolutional network (GCN) for malware detection. For experiments on 26,939 Android software datasets, SFCGDroid in this paper can achieve 98.22% accuracy and 98.20% F1 score. [ABSTRACT FROM AUTHOR]
- Subjects :
- *GENERATING functions
*MALWARE
*SOCIAL networks
Subjects
Details
- Language :
- English
- ISSN :
- 16155262
- Volume :
- 22
- Issue :
- 5
- Database :
- Academic Search Index
- Journal :
- International Journal of Information Security
- Publication Type :
- Academic Journal
- Accession number :
- 172329073
- Full Text :
- https://doi.org/10.1007/s10207-023-00679-x