Skip to main content
Article
Black box analysis of android malware detectors
Array
  • Guruswamy Nellaivadivelu, San Jose State University
  • Fabio Di Troia, San Jose State University
  • Mark Stamp, San Jose State University
Document Type
Article
Publication Date
3-5-2020
Abstract

If a malware detector relies heavily on a feature that is obfuscated in a given malware sample, then the detector will likely fail to correctly classify the malware. In this research, we obfuscate selected features of known Android malware samples and determine whether these obfuscated samples can still be reliably detected. Using this approach, we discover which features are most significant for various sets of Android malware detectors, in effect, performing a black box analysis of these detectors. We find that there is a surprisingly high degree of variability among the key features used by popular malware detectors.

Comments

This article can also be read online here.

Creative Commons License
Creative Commons Attribution 4.0
Citation Information
Guruswamy Nellaivadivelu, Fabio Di Troia and Mark Stamp. "Black box analysis of android malware detectors" Array Vol. 6 (2020)
Available at: http://works.bepress.com/mark_stamp/115/