Investigating suspected background processes in Android malware classification through dynamic automated reverse engineering and semi-automated debugging

dc.contributor.advisorGhorbani, Ali
dc.contributor.authorTaheri, Laya
dc.date.accessioned2023-03-01T16:33:12Z
dc.date.available2023-03-01T16:33:12Z
dc.date.issued2020
dc.date.updated2023-03-01T15:02:40Z
dc.description.abstractAndroid malware detection is one of the enthusiastic research domains in recent years. Despite researchers’ admirable attempts in malware detection, malicious applications keep becoming resistant every year. Attackers develop sophisticated Apps to conceal malicious intentions on the background to be tolerant against naive malware detection methodologies. To fill the gap in the lack of background malware analysis, we present the novel 3-layered malware analysis framework. We designate the proposed framework with the assistance of automated reverse-engineering and dynamic semi-automated Debugging methods. Our APK repository samples are divided into two groups, based on the existence of particular background processes in their source files. We use two separate activation procedures that differ for each group. Here, we generate our Android malware captured dataset consisted of static features, such as permissions, Intents, and metrics and dynamic features, such as network traffic and background services. Finally, we utilize two machine learning models to evaluate our framework. We have aggregated our APK repository samples from two resources, CICAndMal2017 [30]-CICInvesAndMal2019 [39] and Android Wake Lock Research. Through the evaluation experiments of the proposed framework, we have succeeded in achieving 85% accuracy and 88% precision in classifying malware categories and benign samples with Random-Forest model.
dc.description.copyright©Laya Taheri, 2020
dc.formattext/xml
dc.format.extentxiv, 94 pages
dc.format.mediumelectronic
dc.identifier.urihttps://unbscholar.lib.unb.ca/handle/1882/14091
dc.language.isoen_CA
dc.publisherUniversity of New Brunswick
dc.rightshttp://purl.org/coar/access_right/c_abf2
dc.subject.disciplineComputer Science
dc.titleInvestigating suspected background processes in Android malware classification through dynamic automated reverse engineering and semi-automated debugging
dc.typemaster thesis
thesis.degree.disciplineComputer Science
thesis.degree.fullnameMaster of Computer Science
thesis.degree.grantorUniversity of New Brunswick
thesis.degree.levelmasters
thesis.degree.nameM.C.S.

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
item.pdf
Size:
3.92 MB
Format:
Adobe Portable Document Format