Mining Android Bytecodes through the Eyes of Gabor Filters for Detecting Malware

  • Ghadeer Written by
  • Update: 01/03/2023

Mining Android Bytecodes through the Eyes of Gabor Filters for Detecting Malware

Shahid Alam

Department of Computer Engineering, Adana Alparslan Turkes Science and Technology University, Turkey

This email address is being protected from spambots. You need JavaScript enabled to view it.

Alper Kamil Demir

Department of Computer Engineering, Adana Alparslan Turkes Science and Technology University, Turkey

This email address is being protected from spambots. You need JavaScript enabled to view it.

Abstract: One of the basic characteristics of a Gabor filter is that it provides useful information about specific frequencies in a localized region. Such information can be used in locating snippets of code, i.e., localized code, in a program when transformed into an image for finding embedded malicious patterns. Keeping this phenomenon, we propose a novel technique using a sliding Window over Gabor filters for mining the Dalvik Executable (DEX) bytecodes of an Android application (APK) to find malicious patterns. We extract the structural and behavioral functionality and localized information of an APK through Gabor filtered images of the 2D grayscale image of the DEX bytecodes. A Window is slid over these features and a weight is assigned based on its frequency of use. The selected Windows whose weights are greater than a given threshold, are used for training a classifier to detect malware APKs. Our technique does not require any disassembly or execution of the malware program and hence is much safer and more accurate. To further improve feature selection, we apply a greedy optimization algorithm to find the best performing feature subset. The proposed technique, when tested using real malware and benign APKs, obtained a detection rate of 98.9% with 10-fold cross-validation.

Keywords: Android bytecode, malware analysis and detection, sliding window, gabor filters, gabor features, machine learning.

Received February 14, 2021; accepted September 26, 2022

https://doi.org/10.34028/iajit/20/2/4

Full text

Read 377 times Last modified on Thursday, 02 March 2023 07:46
Top
We use cookies to improve our website. By continuing to use this website, you are giving consent to cookies being used. More details…