Abstract
The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-party applications running on top of any Android device. Inter-process communication is one of the most notable features of the Android framework as it allows the reuse of components across process boundaries. This mechanism is used as gateway to access different sensitive services in the Android framework. In the Android platform, this communication system is usually driven by a late runtime binding messaging object known as Intent. In this paper, we evaluate the effectiveness of Android Intents (explicit and implicit) as a distinguishing feature for identifying malicious applications. We show that Intents are semantically rich features that are able to encode the intentions of malware when compared to other well-studied features such as permissions. We also argue that this type of feature is not the ultimate solution. It should be used in conjunction with other known features. We conducted experiments using a dataset containing 7406 applications that comprise 1846 clean and 5560 infected applications. The results show detection rate of 91% using Android Intent against 83% using Android permission. Additionally, experiment on combination of both features results in detection rate of 95.5%.
DOI
10.1016/j.cose.2016.11.007
Publication Date
2017-03-01
Publication Title
COMPUTERS & SECURITY
ISSN
0167-4048
Embargo Period
2017-11-16
Organisational Unit
School of Engineering, Computing and Mathematics
Recommended Citation
Feizollah, A., Anuar, N., Salleh, R., Suarez-Tangil, G., & Furnell, S. (2017) 'AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection', COMPUTERS & SECURITY, . Available at: https://doi.org/10.1016/j.cose.2016.11.007