Volume 12 - Issue 1
Dynamic Mobile Malware Detection through System Call-based Image representation
- Rosangela Casolare
University of Molise, Pesche (IS), Italy
rosangela.casolare@unimol.it
- Carlo De Dominicis
University of Padova, Padova, Italy
carlo.dedominicis.1@studenti.unipd.it
- Giacomo Iadarola
IIT-CNR, Pisa, Italy
giacomo.iadarola@iit.cnr.it
- Fabio Martinelli
IIT-CNR, Pisa, Italy
fabio.martinelli@iit.cnr.it
- Francesco Mercaldo
University of Molise, Pesche (IS), Italy, IIT-CNR, Pisa, Italy
francesco.mercaldo@unimol.it
- Antonella Santone
University of Molise, Pesche (IS), Italy
antonella.santone@unimol.it
Keywords: mobile security, malware analysis, system call, dynamic analysis, Android, machine learning, deep learning, classification
Abstract
Mobile devices, with particular regard to the ones equipped with the Android operating system,
are currently targeted by malicious writers that continuously develop harmful code able to gather
private and sensitive information for our smartphones and tablets. The signature provided by the
antimalware demonstrated to be not effective with new malware or malicious payload obfuscated
with aggressive morphing techniques. Current literature in malware detection proposes methods exploiting
both static (i.e., analysing the source code structure) than dynamic analysis (i.e., considering
characteristics gathered when the application is running). In this paper we propose the representation
of an application in terms of image obtained from the system call trace. Thus, we consider this representation
to input a classifier to automatically discriminate whether an application under analysis is
malware or legitimate. We perform an experimental analysis with several machine and deep learning
classification algorithm evaluating a dataset composed by 6817 real-world malware and legitimate
samples. We obtained an accuracy up to 0.89, showing the effectiveness of the proposed approach.