Content area

Abstract

Traditional machine learning based malware detection methods often use decompiling techniques or dynamic monitoring techniques to extract the feature representation of malware. This procedure is time consuming and strongly depends on the skills of experts. In addition, malware can be packed or encrypted to evade the analysis of decompiling tools. To solve this issue, we propose a static detection method based on deep learning. We directly extract bytecode file from Android APK file, and convert the bytecode file into a two-dimensional bytecode matrix, then use the deep learning algorithm, convolution neural network (CNN), to train a detection model and apply it to classify malware. CNN can automatically learn features of bytecode file which can be used to recognize malware. The proposed detection model avoids the procedure for analyzing malware features and designing the feature representation of malware. The experimental results show the proposed method is effective to detect malware, especially malware encrypted using polymorphic techniques.

Details

Title
Android malware detection method based on bytecode image
Author
Ding, Yuxin 1   VIAFID ORCID Logo  ; Zhang, Xiao 1 ; Hu, Jieke 1 ; Xu, Wenting 1 

 Harbin Institute of Technology, Department of Computer Sciences and Technology, Shenzhen, China (GRID:grid.19373.3f) (ISNI:0000 0001 0193 3564) 
Pages
6401-6410
Publication year
2023
Publication date
May 2023
Publisher
Springer Nature B.V.
ISSN
18685137
e-ISSN
18685145
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2919365177
Copyright
© Springer-Verlag GmbH Germany, part of Springer Nature 2020.