We use cookies to improve your experience with our site.
Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ying Zou. Detecting Android Malware Using Clone Detection[J]. Journal of Computer Science and Technology, 2015, 30(5): 942-956. DOI: 10.1007/s11390-015-1573-7
Citation: Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ying Zou. Detecting Android Malware Using Clone Detection[J]. Journal of Computer Science and Technology, 2015, 30(5): 942-956. DOI: 10.1007/s11390-015-1573-7

Detecting Android Malware Using Clone Detection

  • Android is currently one of the most popular smartphone operating systems. However, Android has the largest share of global mobile malware and significant public attention has been brought to the security issues of Android. In this paper, we investigate the use of a clone detector to identify known Android malware. We collect a set of Android applications known to contain malware and a set of benign applications. We extract the Java source code from the binary code of the applications and use NiCad, a near-miss clone detector, to find the classes of clones in a small subset of the malicious applications. We then use these clone classes as a signature to find similar source files in the rest of the malicious applications. The benign collection is used as a control group. In our evaluation, we successfully decompile more than 1,000 malicious apps in 19 malware families. Our results show that using a small portion of malicious applications as a training set can detect 95% of previously known malware with very low false positives and high accuracy at 96.88%. Our method can effectively and reliably pinpoint malicious applications that belong to certain malware families.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return