Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks

Khaled Al-Thelaya, El Sayed M. El-Alfy*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

With the increasing popularity and wide-spread use of Android systems to empower a variety of devices including smart phones, tablets, watches, televisions, and cars, security becomes a more crucial issue, especially with the increasing level of attacks targeting vulnerabilities in these systems. Subsequently, new approaches need to be explored to detect more sophisticated malware designed to evade detection by installed anti-malware software. This paper presents a new methodology for behavioral analysis of sequences of system calls incurred by various applications to distinguish Android malware from benign applications. We model these sequences using two variants of bidirectional deep recurrent neural networks: Long Short Term Memory (LSTM) and Gated Recurrent Unit (GRU). The performance is evaluated and compared with other systems employing support vector machines and decision trees with traditional feature extraction methods.

Original languageEnglish
Title of host publicationSecurity in Computing and Communications - 7th International Symposium, SSCC 2019, Revised Selected Papers
EditorsSabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat
PublisherSpringer
Pages309-321
Number of pages13
ISBN (Print)9789811548246
DOIs
StatePublished - 2020

Publication series

NameCommunications in Computer and Information Science
Volume1208 CCIS
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Bibliographical note

Publisher Copyright:
© Springer Nature Singapore Pte Ltd. 2020.

ASJC Scopus subject areas

  • General Computer Science
  • General Mathematics

Fingerprint

Dive into the research topics of 'Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks'. Together they form a unique fingerprint.

Cite this