Func: Reducing the impact of Android framework evolution on malware detection
This program is tentative and subject to change.
Android malware detection approaches commonly use APIs and permissions as features for classifying malware. However, since the release of the first Android operating system in 2008, the Android framework has undergone numerous version updates. The evolution of the Android framework over time has led to changes in APIs and permissions, including deprecations and replacements. These changes can result in inaccurate characterization of Android malware, thereby affecting performance of malware detectors. There is a lack of methods to mitigate the impact of Android framework evolution on malware detection. To fill this gap, we conduct a systematic study of the impact of Android framework evolution on APIs and permissions. We then propose a new representation of APIs and permissions that is robust against framework evolution. This new representation characterizes deprecated APIs / permissions and their corresponding replacements. Additionally, for class-level replacements, due to the absence of corresponding API replacement information, we use a LLM to assist in mining deprecation-replacement relationships. We also explore how to better utilize the LLM by applying it to the mining of deprecation-replacement pairs in framework evolution. We consider APIs / permissions with deprecation-replacement relationships as the same feature, as they typically perform the same or similar functions. We apply our proposed representation to improve the performance of four popular Android malware detectors, namely Drebin, Mamadroid, Xmal, and FAMCF. Our experiments focus on evaluating the performance of these malware detectors in the context of framework evolution, more specifically, over API levels 9 to 24. The results indicate that malware detectors utilizing Func features achieve statistically better F1 scores according to Wilcoxon rank-sum tests.
This program is tentative and subject to change.
Wed 15 AprDisplayed time zone: Brasilia, Distrito Federal, Brazil change
11:00 - 12:30 | Evolution 1Journal-first Papers / Research Track at Oceania VIII Chair(s): Leopoldo Teixeira Federal University of Pernambuco | ||
11:00 15mTalk | Func: Reducing the impact of Android framework evolution on malware detection Journal-first Papers Hailong Yu Harbin Institute of Technology, Harbin Institute of Technology Zhengzhou Research Institute, Tiantian Wang Harbin Institute of Technology, Lwin Khin Shar Singapore Management University, Hanmeng Li Harbin Institute of Technology, David Lo Singapore Management University | ||
11:15 15mTalk | Unraveling Code Clone Dynamics in Deep Learning Frameworks Journal-first Papers Maram Assi Université du Québec à Montréal, Safwat Hassan University of Toronto, Ying Zou Queen's University, Kingston, Ontario | ||
11:30 15mTalk | Remediating Superfluous Re-Rendering in React ApplicationsAward Winner Research Track Farideh Khalili , Satyajit Gokhale Amazon, Alexi Turcotte CISPA, Dale Xu Boston University, Frank Tip Northeastern University | ||
11:45 15mTalk | Minimizing Breaking Changes and Redundancy in Mitigating Technical Lag for Java Projects Research Track Rui Lu East China Normal University, Lyuye Zhang Nanyang Technological University, Kaixuan Li Nanyang Technological University, Min Zhang East China Normal University, Yixiang Chen East China Normal University Pre-print | ||
12:00 15mTalk | CRUDinfer: Automated CRUD Semantics Inference for REST APIs Through Black-box Testing Research Track Michele Pasqua University of Verona, Davide Corradini University of Luxembourg, Michele Perlotto University of Naples, Mariano Ceccato University of Verona | ||
12:15 15mTalk | Diffploit: Facilitating Cross-Version Exploit Migration for Open Source Library Vulnerabilities Research Track Zirui Chen , Zhipeng Xue Zhejiang University, Jiayuan Zhou Queen's University, Xing Hu Zhejiang University, Xin Xia Zhejiang University, Xiaohu Yang Zhejiang University | ||