Back to Search Start Over

MASKDROID: Robust Android Malware Detection with Masked Graph Representations

Authors :
Zheng, Jingnan
Liu, Jiaohao
Zhang, An
Zeng, Jun
Yang, Ziqi
Liang, Zhenkai
Chua, Tat-Seng
Source :
IEEE/ACM Automated Software Engineering Conference 2024
Publication Year :
2024

Abstract

Android malware attacks have posed a severe threat to mobile users, necessitating a significant demand for the automated detection system. Among the various tools employed in malware detection, graph representations (e.g., function call graphs) have played a pivotal role in characterizing the behaviors of Android apps. However, though achieving impressive performance in malware detection, current state-of-the-art graph-based malware detectors are vulnerable to adversarial examples. These adversarial examples are meticulously crafted by introducing specific perturbations to normal malicious inputs. To defend against adversarial attacks, existing defensive mechanisms are typically supplementary additions to detectors and exhibit significant limitations, often relying on prior knowledge of adversarial examples and failing to defend against unseen types of attacks effectively. In this paper, we propose MASKDROID, a powerful detector with a strong discriminative ability to identify malware and remarkable robustness against adversarial attacks. Specifically, we introduce a masking mechanism into the Graph Neural Network (GNN) based framework, forcing MASKDROID to recover the whole input graph using a small portion (e.g., 20%) of randomly selected nodes.This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks. While capturing stable malicious semantics in the form of dependencies inside the graph structures, we further employ a contrastive module to encourage MASKDROID to learn more compact representations for both the benign and malicious classes to boost its discriminative power in detecting malware from benign apps and adversarial examples.

Details

Database :
arXiv
Journal :
IEEE/ACM Automated Software Engineering Conference 2024
Publication Type :
Report
Accession number :
edsarx.2409.19594
Document Type :
Working Paper
Full Text :
https://doi.org/10.1145/3691620.3695008