Mostrar el registro sencillo del ítem

dc.contributor.authorRashed, Mohammed
dc.contributor.authorSuarez-Tangil, Guillermo 
dc.date.accessioned2021-09-23T16:17:22Z
dc.date.available2021-09-23T16:17:22Z
dc.date.issued2022
dc.identifier.urihttp://hdl.handle.net/20.500.12761/1513
dc.description.abstractThe increasing number of Android malware forced antivirus (AV) companies to rely on automated classification techniques to determine the family and class of suspicious samples. The research community relies heavily on such labels to carry out prevalence studies of the threat ecosystem and to build datasets that are used to validate and benchmark novel detection and classification methods. In this work, we carry out an extensive study of the Android malware ecosystem by surveying whitepapers and reports from 6 keyplayers in the industry as well as 81 papers from 8 top security conferences to understand how malware datasets are used by both. We, then, explore the limitations associated with the use of available malware classification services, namely VirusTotal (VT) engines, for determining the family of an Android sample. Using a dataset of 2.47M Android malware samples, we find that the detection coverage of VT's AVs is generally very low, that the percentage of samples flagged by any 2 AV engines does not go beyond 52%, and that common families between any pair of AV engines is at best 29%. We rely on clustering to determine the extent to which different AV engine pairs agree upon which samples belong to the same family (regardless of the actual family name), and find that there are discrepancies that can introduce noise in automatic label unification schemes. We also observe the usage of generic labels and inconsistencies within the labels of top AV engines, suggesting that their efforts are directed towards accurate detection rather than classification. Our results contribute to a better understanding of the limitations of using Android malware family labels as supplied by common AV engines.es
dc.language.isoenges
dc.titleAn Analysis of Android Malware Classification Serviceses
dc.typejournal articlees
dc.journal.titleSensorses
dc.type.hasVersionCVoRes
dc.rights.accessRightsopen accesses
dc.description.refereedTRUEes
dc.description.statuspubes


Ficheros en el ítem

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem