RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps
This program is tentative and subject to change.
Android malware detection and family classification have been extensively studied, yet localizing the exact malicious payloads within a detected sample remains a challenging and labor-intensive task. We propose RAML, a novel Retrieval-Augmented Malicious payload Localization pipeline inspired by retrieval-augmented generation (RAG), which leverages large language models (LLMs) to bridge high-level behavior descriptions and low-level Smali code. RAML generates class-level descriptions from Smali code, embeds them into a vector database, and performs semantic retrieval via similarity search. Matched candidates are re-ranked with LLM assistance, followed by method-level LLM analysis to precisely identify malicious methods and provide insightful role explanations. Preliminary results show that RAML effectively localizes corresponding malicious payloads based on behavioral descriptions, narrows the analysis scope, and reduces manual effort—offering a promising direction for automated malware forensics.
This program is tentative and subject to change.
Wed 19 NovDisplayed time zone: Seoul change
16:00 - 17:00 | |||
16:00 10mTalk | RAML: Toward Retrieval-Augmented Localization of Malicious Payloads in Android Apps NIER Track Tiezhu Sun University of Luxembourg, Marco Alecci University of Luxembourg, Yewei Song University of Luxembourg, Xunzhu Tang University of Luxembourg, Kisub Kim DGIST, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg | ||
16:10 10mTalk | Unlocking Reproducibility: Automating re-Build Process for Open-Source Software Industry Showcase Behnaz Hassanshahi Oracle, Trong Nhan Mai Oracle Labs, Benjamin Selwyn-Smith Oracle Labs, Nicholas Allen Oracle | ||
16:20 10mTalk | JSidentify-V2: Dynamic Memory Fingerprinting for Mini-Game Plagiarism Detection Industry Showcase Zhihao Li Tencent Inc., Chaozheng Wang The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Xinyong Peng Tencent Inc., Qun Xia Tencent Inc., Haochuan Lu Tencent, Ting Xiong Tencent Inc., Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Shenzhen, Shuai Wang Hong Kong University of Science and Technology, Yuetang Deng Tencent, Huafeng Ma Tencent Inc. | ||
16:30 10mTalk | IDBFuzz: Web Storage DataBase Fuzzing with Controllable Semantics NIER Track Jingyi Chen Jiangsu University, Jinfu Chen Jiangsu University, Saihua Cai Jiangsu University, Shengran Wang Jiangsu University | ||
16:40 10mTalk | SCOPE: Evaluating and Enhancing Permission Explanation Transparency in Mobile Apps Industry Showcase Liu Wang Beijing University of Posts and Telecommunications, Tianshu Zhou Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, Xiyuan Liu Freshippo-Alibaba Group, Yi Wang | ||
16:50 10mTalk | ApkArmor: Low-Cost Lightweight Anti-Decompilation Techniques for Android Apps Industry Showcase Jiayang Liu Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Pengcheng Xia Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||