Affiliation:
1. King’s College London, UK
2. International University of Rabat, FIL, TICLab, Morocco
3. Dartmouth College, Hanover, USA
4. University of Modena and Reggio Emilia, Italy
Abstract
According to Nokia’s 2017 Threat Intelligence Report, 68.5% of malware targets the Android platform; Windows is second with 28%, followed by iOS and other platforms with 3.5%. The Android spyware family U
A
P
USH
was responsible for the most infections, and several of the top 20 most common Android malware were spyware. Simply put, modern spyware steals the basic information needed to fuel more deadly attacks such as ransomware and banking fraud. Not surprisingly, some forms of spyware are also classified as banking trojans (e.g., A
CE
C
ARD
). We present a data-driven characterization of the principal factors that distinguish modern Android spyware (July 2016–July 2017) both from goodware and other Android malware, using both traditional and deep ML. First, we propose an Ensemble Late Fusion (ELF) architecture that combines the results of multiple classifiers’ predicted probabilities to generate a final prediction. We show that ELF outperforms several of the best-known traditional and deep learning classifiers. Second, we automatically identify key features that distinguish spyware both from goodware and from other malware. Finally we present a detailed analysis of the factors distinguishing five important families of Android spyware: U
A
P
USH
, P
INCER
, H
E
H
E
, USBC
LEAVER
, and A
CE
C
ARD
(the last is a hybrid spyware-banking trojan).
Funder
North Atlantic Treaty Organization (NATO) Science for Peace and Security (SPS) programme
Army Research Office
Office of Naval Research
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Management Information Systems
Reference85 articles.
1. [n.d.]. Retrieved from https://www.virustotal.com/. [n.d.]. Retrieved from https://www.virustotal.com/.
2. [n.d.]. Retrieved from https://github.com/pjlantz/droidbox. [n.d.]. Retrieved from https://github.com/pjlantz/droidbox.
3. [n.d.]. Whaling Emerges as Major Cybersecurity Threat. Retrieved from https://www.cio.com/article/3059621/security/whaling-emerges-as-major-cybersecurity-threat.html. [n.d.]. Whaling Emerges as Major Cybersecurity Threat. Retrieved from https://www.cio.com/article/3059621/security/whaling-emerges-as-major-cybersecurity-threat.html.
4. 2017. McAfee Mobile Threat Report [Internet]. Retrieved from https://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2017.pdf. 2017. McAfee Mobile Threat Report [Internet]. Retrieved from https://www.mcafee.com/us/resources/reports/rp-mobile-threat-report-2017.pdf.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献