


There are numerous malware detection and antivirus apps for mobile devices running the Android operating system. However, a team in China introduces a new approach that can detect malicious activity at the source code level. They provide details in the International Journal of Information and Computer Security.
Junaid Akram, Majid Mumtaz, Gul Jabeen, and Ping Luo of The Key State Laboratory of Information Security at Tsinghua University, explain how their approach is not only scalable but offers self-optimisation of the signature set as it detects malicious apps by reading their source code. The team has developed a prototype of their software, DroidMD. They have tested it against almost 30000 applications of which 3,670 are already identified as malware. It is reliable because it analyzes only the code and has a high detection accuracy of 95.5%. The team points out that one of the unique characteristics of their software is that it can detect malware that is a clone or “near-miss” of known viruses and malware. Conventional antivirus and malware detection often fails to detect such malware where the software signature may well be only marginally different from the original virus.
Given that there are millions of users downloading thousands of apps every day, it is imperative that an effective and reliable approach to controlling malware be found to slow the assimilation of devices into bot nets and other malicious networks and reduce the risk of user data and privacy being compromised by malware.
“In our future work, we will make DroidMD more resilient for minimizing the obfuscation and improving its run time. Meanwhile, we will extend it for other programming languages to detect malware or malicious code fragments from source code to overcome security threats,” the team writes.
More information:
Junaid Akram et al, DroidMD: an efficient and scalable Android malware detection approach at source code level, International Journal of Information and Computer Security (2021). DOI: 10.1504/IJICS.2021.116310
Junaid Akram et al, DroidMD: an efficient and scalable Android malware detection approach at source code level, International Journal of Information and Computer Security (2021). DOI: 10.1504/IJICS.2021.116310
Citation:
New malware detection for Android at the source code level (2021, July 23)
retrieved 23 July 2021
from https://techxplore.com/news/2021-07-malware-android-source-code.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
more recommended stories
Get two drones for the price of one
Don’t miss your chance on two.
Apps and advertisers are coming for your lock screen, and it’s going to be exhausting
Your phone’s lock screen is the.
How to return a column of n consecutive values in Microsoft Excel
Image: PixieMe/Adobe Stock The fill handle.
Twitter banned the Proud Boys, but they’re still there. Under Elon Musk, there could be more
Credit: Unsplash/CC0 Public Domain On April.
Go read this story about the guy behind RadioShack’s sex-crazed new Twitter strategy
There are no good, practical, rational.
‘Guerrilla’ sales, crowdsourcing: Japan’s game console crunch
The PlayStation console has been hard.
YouTube, Instagram, Discord appear to pull pages belonging to Illinois shooting person of interest
YouTube, Instagram, Discord, and Twitter moved.
Third-party technology partners accelerate integration, digitization and dexterity in B2B commerce
TradeCentric’s Michael Sonier explains why your.
Xiaomi put a huge camera sensor in its new Mi 12S Ultra flagship smartphone
Xiaomi is introducing a trio of.
Twitter Blue subscribers on Android can now pay to remove the Spaces tab
Twitter Blue has finally started letting.