Affiliation:
1. Technische Universität München, Germany
Abstract
The malware analysis and detection research community relies on the online platform VirusTotal to label Android apps based on the scan results of around 60 antiviral scanners. Unfortunately, there are no standards on how to best interpret the scan results acquired from VirusTotal, which leads to the utilization of different threshold-based labeling strategies (e.g., if 10 or more scanners deem an app malicious, it is considered malicious). While some of the utilized thresholds may be able to accurately approximate the ground truths of apps, the fact that VirusTotal changes the set and versions of the scanners it uses makes such thresholds unsustainable over time. We implemented a method,
Maat
, that tackles these issues of standardization and sustainability by automatically generating a
Machine Learning
(
ML
)-based labeling scheme, which outperforms threshold-based labeling strategies. Using the VirusTotal scan reports of 53K Android apps that span 1 year, we evaluated the applicability of
Maat
’s
Machine Learning
(
ML
)-based labeling strategies by comparing their performance against threshold-based strategies. We found that such
ML
-based strategies (a) can accurately and consistently label apps based on their VirusTotal scan reports, and (b) contribute to training
ML
-based detection methods that are more effective at classifying out-of-sample apps than their threshold-based counterparts.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献