Android malware classification method: Dalvik bytecode frequency analysis

  • Authors:
  • Byeongho Kang;BooJoong Kang;Jungtae Kim;Eul Gyu Im

  • Affiliations:
  • Hanyang University Seoul, Korea;Hanyang University Seoul, Korea;Hanyang University Seoul, Korea;Hanyang University Seoul, Korea

  • Venue:
  • Proceedings of the 2013 Research in Adaptive and Convergent Systems
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The number of Android malware is increasing with the growth of Android, so there needs to have a method to classify malware families. There are many classification methods proposed so far, but most of them are based on permission information such as the number of requested permissions and critical permissions. Since permission information cannot represent actual application behaviors and permissions are easily separated into several communicating applications, the permission based classification methods can result in false alarms. Opposed to these permission based methods, our classification method is based on applications' Bytecode that contains actual application behaviors. Each malicious application family may have some similar Bytecode and can be classified using this information. In this paper, we propose a method to classify malware families from known malware, as a pre-step of malware detection.