Deep Learning for Android Malware Defenses: a Systematic Literature
Review
- URL: http://arxiv.org/abs/2103.05292v1
- Date: Tue, 9 Mar 2021 08:33:08 GMT
- Title: Deep Learning for Android Malware Defenses: a Systematic Literature
Review
- Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li and Yepang Liu
- Abstract summary: Malicious applications (especially in the Android platform) are a serious threat to developers and end-users.
Deep learning techniques to thwart the attack of Android malware has recently gained considerable research attention.
Yet, there exists no systematic literature review that focuses on deep learning approaches for Android Malware defenses.
- Score: 16.2206504908646
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Malicious applications (especially in the Android platform) are a serious
threat to developers and end-users. Many research efforts have hence been
devoted to developing effective approaches to defend Android malware. However,
with the explosive growth of Android malware and the continuous advancement of
malicious evasion technologies like obfuscation and reflection, android malware
defenses based on manual rules or traditional machine learning may not be
effective due to limited apriori knowledge. In recent years, a dominant
research field of deep learning (DL) with the powerful feature abstraction
ability has demonstrated a compelling and promising performance in various
fields, like Nature Language processing and image processing. To this end,
employing deep learning techniques to thwart the attack of Android malware has
recently gained considerable research attention. Yet, there exists no
systematic literature review that focuses on deep learning approaches for
Android Malware defenses. In this paper, we conducted a systematic literature
review to search and analyze how deep learning approaches have been applied in
the context of malware defenses in the Android environment. As a result, a
total of 104 studies were identified over the period 2014-2020. The results of
our investigation show that even though most of these studies still mainly
consider DL-based on Android malware detection, 35 primary studies (33.7\%)
design the defenses approaches based on other scenarios. This review also
describes research trends, research focuses, challenges, and future research
directions in DL-based Android malware defenses.
Related papers
- MASKDROID: Robust Android Malware Detection with Masked Graph Representations [56.09270390096083]
We propose MASKDROID, a powerful detector with a strong discriminative ability to identify malware.
We introduce a masking mechanism into the Graph Neural Network based framework, forcing MASKDROID to recover the whole input graph.
This strategy enables the model to understand the malicious semantics and learn more stable representations, enhancing its robustness against adversarial attacks.
arXiv Detail & Related papers (2024-09-29T07:22:47Z) - Unraveling the Key of Machine Learning Solutions for Android Malware
Detection [33.63795751798441]
This paper presents a comprehensive investigation into machine learning-based Android malware detection.
We first survey the literature, categorizing contributions into a taxonomy based on the Android feature engineering and ML modeling pipeline.
Then, we design a general-propose framework for ML-based Android malware detection, re-implement 12 representative approaches from different research communities, and evaluate them from three primary dimensions, i.e. effectiveness, robustness, and efficiency.
arXiv Detail & Related papers (2024-02-05T12:31:19Z) - ActDroid: An active learning framework for Android malware detection [3.195234044113248]
A new piece of malware appears online every 12 seconds.
Online learning can be used to mitigate the problem of labelling applications.
Our framework achieves accuracies of up to 96%.
arXiv Detail & Related papers (2024-01-30T13:10:33Z) - DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified
Robustness [58.23214712926585]
We develop a certified defense, DRSM (De-Randomized Smoothed MalConv), by redesigning the de-randomized smoothing technique for the domain of malware detection.
Specifically, we propose a window ablation scheme to provably limit the impact of adversarial bytes while maximally preserving local structures of the executables.
We are the first to offer certified robustness in the realm of static detection of malware executables.
arXiv Detail & Related papers (2023-03-20T17:25:22Z) - The State-of-the-Art in AI-Based Malware Detection Techniques: A Review [0.0]
This review aims to outline the state-of-the-art AI techniques used in malware detection and prevention.
The algorithms investigated consist of Shallow Learning, Deep Learning and Bio-Inspired Computing.
The survey also touches on the rapid adoption of AI by cybercriminals as a means to create ever more advanced malware.
arXiv Detail & Related papers (2022-10-12T16:44:52Z) - Towards a Fair Comparison and Realistic Design and Evaluation Framework
of Android Malware Detectors [63.75363908696257]
We analyze 10 influential research works on Android malware detection using a common evaluation framework.
We identify five factors that, if not taken into account when creating datasets and designing detectors, significantly affect the trained ML models.
We conclude that the studied ML-based detectors have been evaluated optimistically, which justifies the good published results.
arXiv Detail & Related papers (2022-05-25T08:28:08Z) - Adversarial Patterns: Building Robust Android Malware Classifiers [0.9208007322096533]
In the field of cybersecurity, machine learning models have made significant improvements in malware detection.
Despite their ability to understand complex patterns from unstructured data, these models are susceptible to adversarial attacks.
This paper provides a comprehensive review of adversarial machine learning in the context of Android malware classifiers.
arXiv Detail & Related papers (2022-03-04T03:47:08Z) - Adversarial Attacks against Windows PE Malware Detection: A Survey of
the State-of-the-Art [44.975088044180374]
This paper focuses on malware with the file format of portable executable (PE) in the family of Windows operating systems, namely Windows PE malware.
We first outline the general learning framework of Windows PE malware detection based on ML/DL.
We then highlight three unique challenges of performing adversarial attacks in the context of PE malware.
arXiv Detail & Related papers (2021-12-23T02:12:43Z) - Threat of Adversarial Attacks on Deep Learning in Computer Vision:
Survey II [86.51135909513047]
Deep Learning is vulnerable to adversarial attacks that can manipulate its predictions.
This article reviews the contributions made by the computer vision community in adversarial attacks on deep learning.
It provides definitions of technical terminologies for non-experts in this domain.
arXiv Detail & Related papers (2021-08-01T08:54:47Z) - Android Malware Category and Family Detection and Identification using
Machine Learning [0.0]
We present two machine-learning approaches for Dynamic Analysis of Android Malware.
Our approach achieves in Android Malware Category detection more than 96 % accurate and achieves in Android Malware Family detection more than 99% accurate.
arXiv Detail & Related papers (2021-07-05T10:48:40Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.