Enhancing android malware detection explainability through function call graph APIs

Soi, Diego
;
Sanna, Alessandro;Maiorca, Davide;Giacinto, Giorgio
2024-01-01

Abstract

Nowadays, mobile devices are massively used in everyday activities. Thus, they contain sensitive data targeted by threat actors like bank accounts and personal information. Through the years, Machine Learning approaches have been proposed to identify malicious Android applications, but recent research highlights the need for better explanations for model decisions, as existing ones may not be related to the app’s malicious functionalities. This paper proposes an explainable approach based on static analysis to detect Android malware. The novelty lies in the specific analysis conducted to select and extract the features (i.e., APIs taken from the DEX Call Graph) that immediately provide meaningful explanations of the model functionality, thus allowing a significant correlation of the malware behavior with its family. Moreover, since we contain the number and type of features, the distinct impacts of each one appear more evident. The attained results show that it is possible to reach comparable results (in terms of accuracy) to existing state-of-the-art models while providing easy-to-understand explanations, which may yield significant insights into the malicious functionalities of the samples.
2024
Malware analysis, Deep learning, Explainability, Android
Files in This Item:
File Size Format  
Enhancing android malware detection explainability through function call graph APIs_2024.pdf

open access

Description: articolo online
Type: versione editoriale
Size 1.65 MB
Format Adobe PDF
1.65 MB Adobe PDF View/Open

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Questionnaire and social

Share on:
Impostazioni cookie