z-logo
open-access-imgOpen Access
Android Malware Detection via Graph Representation Learning
Author(s) -
Pengbin Feng,
Jianfeng Ma,
Teng Li,
Xindi Ma,
Ning Xi,
Di Lu
Publication year - 2021
Publication title -
mobile information systems
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.346
H-Index - 34
eISSN - 1875-905X
pISSN - 1574-017X
DOI - 10.1155/2021/5538841
Subject(s) - computer science , malware , android (operating system) , malware analysis , android malware , system call , artificial intelligence , word2vec , graph , static analysis , call graph , machine learning , theoretical computer science , operating system , programming language , embedding
With the widespread usage of Android smartphones in our daily lives, the Android platform has become an attractive target for malware authors. 'ere is an urgent need for developing an automatic malware detection approach to prevent the spread of malware.'e low code coverage and poor efficiency of the dynamic analysis limit the large-scale deployment of malware detection methods based on dynamic features. 'erefore, researchers have proposed a plethora of detection approaches based on abundant static features to provide efficient malware detection. 'is paper explores the direction of Android malware detection based on graph representation learning. Without complex feature graph construction, we propose a new Android malware detection approach based on lightweight static analysis via the graph neural network (GNN). Instead of directly extracting Application Programming Interface (API) call information, we further analyze the source code of Android applications to extract high-level semantic information, which increases the barrier of evading detection. Particularly, we construct approximate call graphs from function invocation relationships within an Android application to represent this application and further extract intrafunction attributes, including required permission, security level, and Smali instructions’ semantic information via Word2Vec, to form the node attributes within graph structures. 'en, we use the graph neural network to generate a vector representation of the application, and then malware detection is performed on this representation space. We conduct experiments on real-world application samples. 'e experimental results demonstrate that our approach implements high effective malware detection and outperforms state-of-the-art detection approaches.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom