PermPair Android Malware Detection Using Permission Pairs
PermPair Android Malware Detection Using Permission Pairs
PermPair Android Malware Detection Using Permission Pairs
15, 2020
Abstract— The Android smartphones are highly prone to platform [2]. This indicates that Android is evidently the major
spreading the malware due to intrinsic feebleness that per- target, with nearly 5000-6000 malware samples attacking
mits an application to access the internal resources when the them every 14 seconds, and the figure touched 3.5 million
user grants the permissions knowingly or unknowingly. Hence,
the researchers have focused on identifying the conspicuous malicious samples in 2017 and is expected to rise to 25 mil-
permissions that lead to malware detection. Most of these per- lion by 2019 [3]. This trend shows how malware attackers
missions, common to malware and normal applications present are relentlessly developing new malware samples targeting
themselves in different patterns and contribute to attacks. There- smartphones, especially Android. Apart from the traditional
fore, it is essential to find the significant combinations of the drive-by-downloads way of infecting the system, malware is
permissions that can be dangerous. Hence, this paper aims to
identify the pairs of permissions that can be dangerous. To the also injected into smartphones through repackaging and update
best of our knowledge, none of the existing works have used the attacks. The threats posed by mobile malware include financial
permission pairs to detect malware. In this paper, we proposed loss to users, information leakage, system damage, and mobile
an innovative detection model, named PermPair, that constructs bots [4].
and compares the graphs for malware and normal samples by The increase in the number of Android malware attacks is
extracting the permission pairs from the manifest file of an
application. The evaluation results indicate that the proposed mainly from three major sources: (a) App markets, an easy
scheme is successful in detecting malicious samples with an distribution gateway for malware developers; (b) Users, drive-
accuracy of 95.44% when compared to other similar approaches by-downloads, and (c) Developers, weak code.
and favorite mobile anti-malware apps. Further, we also proposed The design of the Android platform secures the system by
an efficient edge elimination algorithm that removed 7% of the restricting the access to local resources by the applications
unnecessary edges from the malware graph and 41% from the
normal graph. This lead to minimum space utility and also 28% (apps) using the permission constraints. A user is prompted
decrease in the detection time. with the list of permissions during the installation of an
application. This list is supposed to alert the users about
Index Terms— Android malware, android security, malware
detection, permissions pair graph, smartphone security. the resources that the application accesses. Most of the users
ignore them and grant the permissions liberally. They do not
I. I NTRODUCTION have adequate expertise to understand the significance of these
permissions, and the harm caused by them if any [10]. This
S MARTPHONES have gained popularity with the presence
of feature-rich apps which provide services like social
networking, online banking, online gaming, and location-
weakness of the users drew the attention of the attackers.
Consequently, the researchers aim to analyze the permissions
based services, in addition to the conventional services like for detecting malicious behavior.
phone calls and messaging. A report [1] shows that there is Several related works such as [5], [8], [14]–[16], [22],
tremendous growth in smartphone sales, with 82% Android [23], [25] have used permissions to detect Android mal-
smartphone users. Rising popularity has made them suscepti- ware. They have analyzed the permissions in malicious apps,
ble to malware attacks. The year 2013 recorded 1,45,000 new detected during the period, 2010-2012. These studies have
malware samples, with 97% of them targeted towards Android examined the permissions of normal and malicious samples,
and have reported that most of the top permissions in malware
Manuscript received August 9, 2018; revised December 11, 2018, and normal apps are quite similar, and hence not distin-
April 3, 2019, May 17, 2019, July 14, 2019, and August 26, 2019; accepted
October 11, 2019. Date of publication October 29, 2019; date of current guishable. For instance, the authors in [14] reported that
version January 30, 2020. The associate editor coordinating the review of this the top five permissions in both the categories are exactly
manuscript and approving it for publication was Prof. Wojciech Mazurczyk. the same. Therefore, it is important to find the vital com-
(Corresponding author: Anshul Arora.)
A. Arora is with the Discipline of Mathematics and Computing, binations of the permissions present in malware and normal
Delhi Technological University Delhi, Delhi 110042, India (e-mail: samples. None of the previous works, except the one proposed
[email protected]). in [22], have aimed at finding the permission patterns that
S. K. Peddoju is with the Department of Computer Science and Engineering,
IIT Roorkee, Roorkee 247667, India (e-mail: [email protected]). can launch any malicious activity. They have also identified
M. Conti is with the Department of Mathematics, University of Padua, risky permission patterns in malware samples. However, they
35122 Padova, Italy, and also with the Department of Electrical Engineer- did not find the permission patterns that occur prominently in
ing, University of Washington, Seattle WA 98195 USA (e-mail: conti@
math.unipd.it). normal apps. Moreover, they did not propose any detection
Digital Object Identifier 10.1109/TIFS.2019.2950134 model.
1556-6013 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
ARORA et al.: PERMPAIR: ANDROID MALWARE DETECTION USING PERMISSION PAIRS 1969
Motivation: We believe that the pairing of dangerous per- PermPair model is in section III. A report of results and
missions together can be effective in detecting malicious apps. findings of the proposed work is presented in section IV.
For instance, to leak device-specific information to the server, Finally, section V concludes with the scope of future work.
an application requires only two permissions: INTERNET
and READ_PHONE_STATE. This permission pair, alone,
II. BACKGROUND AND R ELATED W ORK
is dangerous and can launch a malicious activity. However, to
evade the detection, malware developers may supplement some This section, initially, presents a brief description of
additional permissions [11]. The presence of such dangerous Android permission system followed by a critical review of
permission pairs can help detect malicious behavior. Therefore, the studies that have been proposed for Android malware
this work aims to analyze permissions in a group of two detection. In the end, a summary of the important takeouts
and proposes a new methodology to find such pairs that from the review of the literature is presented.
can distinguish normal and malicious samples. The following
research questions emerge in the light of permission pair
analysis: A. Background
1) How to represent the permission pairs extracted from Every Android application1 consists of AndroidManifest.xml
the applications? file having permissions and other parameters required by the
2) How to build a detection model using permission pairs? application. The user receives this list of permissions for
3) Is there any change in the permission pairs of malware additional resources at the time of installation. Once the user
samples over a period of time? grants all the permissions, the app gets installed. The Java code
4) What are the top dangerous permission pairs present in of the application houses, possibly, the malicious component
malicious samples but not in benign ones? of the malware samples. If the manifest file has the required
5) What are the top permission pairs present in normal apps permissions, it invokes the API calls in the code. This is the
and how are they different from malicious samples? primary reason why permissions have been the most used static
We are motivated to answer these questions with a vision feature in Android malware detection.
to develop an Android malware detector based on permission
pairs. We present PermPair: Permission Pair Based Android
B. Related Work
Malware Detection model, based upon permissions extracted
from the manifest file of the applications. We use the graph Android malware detection is broadly categorized into three
data structure to represent these permission pairs. Our detec- types: Static, Dynamic, and Hybrid Detection. This section
tion results are relatively better than the mobile anti-malware reviews all these detection types published in the literature in
apps which we evaluate against the same dataset of malicious the following subsections.
apps. The work proposed in this paper employs a mix of old 1) Static Detection: Static solutions aim to analyze the
and recent datasets for evaluation. app’s manifest file components, Java code or the sequence
Contributions: The contributions of this research are of API calls within the code. These related works can fur-
highlighted below: ther be sub-divided into six categories: Permissions Analysis,
• Built the permission pair graphs for different malware Permissions Based Malware Detection, Permission Pattern
datasets and analyzed the impact of the permission pairs Analysis of Android Malware, Manifest File-Based Detection,
on both, old and recent, malicious apps. Permission Graph Analysis, and API Calls Based Detection.
• Proposed a novel algorithm to merge graphs of different a) Permissions analysis: Some of the earlier works
malware datasets to construct a single final malware graph like [8], [9] analyzed permissions to detect malicious behavior
of permission pairs (named as Malicious-Graph (G M )). within the normal apps. Grace et al. [8] evaluated potential
Similarly, a separate permission pair graph of normal apps risks associated with in-app advertisement libraries by ana-
known as Normal-Graph (G N ) was also established. lyzing permissions and API calls. Kirin [9] model developed
• Designed an algorithm to detect malicious apps by com-
the security rules to identify the risky applications based upon
paring both malicious (G M ) and normal (G N ) graphs. permission combinations.
Holavanalli et al. [12] analyzed the cross-app, i.e., colluding
• Compared the detection results with that of widely used
apps, flow permissions to identify the interaction of apps with
mobile anti-malware apps and other similar defense
each other. Grace et al. [13] identified the permission leaks,
mechanisms proposed in the literature. Concluded that
i.e., several permissions that protect access to sensitive user
the proposed approach is more effective in detecting
data are unsafely exposed to other apps.
malicious apps.
In all of these studies, the authors have analyzed permissions
• Performed edge elimination to remove insignificant per-
within the normal apps to look for any signs of dangerous
mission pairs from both the graphs, to reduce the size of behavior. They did not consider the malware samples in their
the graphs and the detection time. analysis. However, we aim to find the dangerous permission
Organization: The rest of the paper is organized as follows: pairs found in malware samples by analyzing different mal-
Section II provides the background knowledge of Android ware datasets.
permissions, and related work proposed in the literature for
Android malware detection. The discussion of the proposed 1 https://developer.android.com/guide/topics/manifest/manifest-intro
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
1970 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
ARORA et al.: PERMPAIR: ANDROID MALWARE DETECTION USING PERMISSION PAIRS 1971
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
1972 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
ARORA et al.: PERMPAIR: ANDROID MALWARE DETECTION USING PERMISSION PAIRS 1973
ewn (from G N ) respectively. The weight assigned to function ei in G M . The Equation 4 denotes functions F1 and F2 .
F1 , say α1 , is the ratio of the percentage of malware samples
containing that edge e to the percentage of the total number F1 = (m i − wn )(w1 + w2 + w3 ), F2 = (wn − m i )(wn ).
of samples containing e, as mentioned in Equation 3. (4)
ewi where w1 , w2 , w3 , and wn denotes the weights for ei in
α1 = i . (3)
i wi + ewn
e G G , G D , G K , and G N respectively. The probability of a
sample to be classified as malware increases when the weight
Here i ewi is the sum of edge weights of any edge e in of any permission pair in G M is higher than G N . If m i is
all the malicious graphs and ewn represents its edge weight in greater than wn , then the probability of (w1 + w2 + w3 )
the normal graph. percentage of samples to be classified as malware increases
Similarly, the weight assigned to function F2 , say α2 , is the by (m i − wn ). If wn is more than m i , the probability of wn
ratio of the percentage of normal samples containing that edge percentage of samples to be classified as normal increases by
e to the percentage of the total number of samples containing (wn − m i ). Hence, we choose m i such that both F1 and F2
the edge e. are optimized. No single value of m i can optimize both the
Algorithm 2 describes the method to merge three mal- objectives. Therefore, the weighted sum method is opted to
ware graphs. We divide the complete edge set into disjoint solve, which reduces this to single-objective optimization as:
and collectively exhaustive sets called Common edge−set and
Di s j oi ntedge−set . We place the edges common in two or three Maxi mi ze Z = α1 (m i − wn )(w1 + w2 + w3 )
graphs in Common edge−set . We place the remaining edges in + α2 (wn − m i )(wn ), (5)
Di s j oi ntedge−set and then add them forthwith to G M .
subject to the three constraints:
Algorithm 2 Graph Merge Algorithm {α1 + α2 = 1, m i <= max(w1, w2 , w3 ), and
1: Input: Three separate malware graphs: G G (Vg ,E g ),
m i >= mi n(w1 , w2 , w3 )}. (6)
G D (Vd ,E d ) and G K (Vk ,E k )
2: Output: Final Malware Graph G M (Vm ,E m ) For every edge ei in Common edge−set , we calculate its
3: Distribute edge set of all three graphs in two subsets: weight m i using equations 5 and 6. Then we add ei and its
Common edge−set and Di s j oi ntedge−set . weight m i to the final malware graph G M .
4: for each edge ei ∈ Di s j oi ntedge−set do Let us consider an example where there is a common edge,
5: E m ← (ei , W (ei )) say E C , in all the three malware graphs and the normal graph.
6: end for Suppose E C has weights w1 , w2 , and w3 in the three malware
7: for each edge e j ∈ Common edge−set do graphs and wn in the normal graph respectively. We apply
8: w1 ← weight of e j ∈ G G Algorithm 2 to find the weight of E C in G M . There can be
9: w2 ← weight of e j ∈ G D three possibilities:
10: w3 ← weight of e j ∈ G K • If the edge weight of E C in all the three malware graphs
11: wn ← weight of e j ∈ G N is higher than that in the normal graph, Algorithm 2
12: if minimum{w1 ,w2 ,w3 } > wn then (Steps 12-14) gives Minimum(w1 , w2 , w3 ) as the weight
13: W (e j ) ← minimum{w1,w2 ,w3 } for the edge E C in G M .
14: E m ← (e j , W (e j ))
• If the edge weight of E C in all the three malware graphs
15: else if maximum{w1 ,w2 ,w3 } < wn then
is lower than that in the normal graph, Algorithm 2
16: W (e j ) ← maximum{w1,w2 ,w3 }
(Steps 15-17) gives Maximum(w1 , w2 , w3 ) as the weight
17: E m ← (e j , W (e j ))
for the edge E C in G M .
18: else
19: Let m j be weight of edge e j in final graph G M • Let w1 , w2 , w3 , and wn be 0.6, 0.7, 0.9, and 0.8 respec-
20: Solve for m j the following optimization problem: tively, i.e., edge weight of E C in G N lies between
21: Maximize Z = α1 (m j −wn )(w1 +w2 +w3 )+α2 (wn − Minimum(w1 , w2 , w3 ) and Maximum(w1, w2 , w3 ).
m j )(wn ); Algorithm 2 (Steps 18-23), formulates the following
Subject to constraints: α1 +α2 = 1 and m j <= multi-objective optimization problem:
max(w1, w2 , w3 ) and m j >= mi n(w1 , w2 , w3 ) Maxi mi ze Z = α1 (m i − 0.8)(0.6 + 0.7 + 0.9)
22: W (e j ) ← m j
23: E m ← (e j , W (e j )) + α2 (0.8 − m i )(0.8), (7)
24: end if where m i is the required weight of edge E C in G M ,
25: end for
26: Return G M (Vm ,E m ) 0.6 + 0.7 + 0.9
α1 = = 0.73, (8)
0.6 + 0.7 + 0.9 + 0.8
We apply the weighted sum method to find the weight for and
the common edges. Let m i be the weight of a common edge
α2 = 1 − 0.73 = 0.27. (9)
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
1974 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
ARORA et al.: PERMPAIR: ANDROID MALWARE DETECTION USING PERMISSION PAIRS 1975
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
1976 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
TABLE VI TABLE IX
N UMBER OF N ORMAL A PPS U SED (C ATEGORY-W ISE ) D IFFERENT M ERGING S CHEMES TO G ET G M AND T HEIR
C OMPARISON OF D ETECTION R ESULTS
TABLE X
T OP T EN P ERMISSION PAIRS IN F INAL M ALICIOUS G RAPH
TAKEN F ROM D IFFERENT C OMBINATIONS
TABLE VII
N OTATIONS U SED FOR T OP P ERMISSIONS
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
ARORA et al.: PERMPAIR: ANDROID MALWARE DETECTION USING PERMISSION PAIRS 1977
Fig. 4. Comparison of top permission pairs for the detection of Malware samples.
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
1978 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
Fig. 5. Comparison of top permission pairs for the detection of normal samples.
TABLE XII
FALSE P OSITIVES : P RESENCE OF T OP D ANGEROUS P ERMISSION PAIRS IN N ORMAL A PPS
weighted sum approach is 95.44%, which is better than the a high difference of 21 and 10 respectively. WhatsApp also
accuracy achieved by any of the individual malware graphs. contained 6 of the top ten dangerous permission pairs, but
We merged two malware graphs at a time, using the same it was the presence of permissions like SYSTEM_ALERT_
Weighted Sum approach, and checked for detection accuracy, WINDOW, RECEIVE_MMS, BROADCAST_SMS, READ_
as summarized in Table XI. None of the two-graphs merge CALL_LOG and WRITE_CALL_LOG in TextPlus and Chaton
approaches yielded better accuracy than the three-graph merge which gave a high malicious score. The pairing of these per-
approach. Hence, we focused our discussion on three-graphs missions with INTERNET and ACCESS_NETWORK_STATE
merge approach. This subsection deals with the analysis of had a high weight in G M than in G N , hence giving a high
false positives and false negatives when we merge all three malware score.
graphs to get G M . Remaining 65% of the FPs had a very low score difference,
a) False positives analysis: Graph-6, from Table IX, and they belonged to categories like online shopping apps, taxi
when used as G M , identified 4.25% False Positives (FPs). booking apps, spy camera apps, and online games. Figure 6(a)
Table XII, having top ten dangerous permission pairs, pre- showed the difference in the score of the testing set of normal
sented the reason behind these results. A pair is said to be apps. Most of the FPs had a score difference of as low as 0.05.
dangerous if it has more weight in G M than in G N . As big as Apps like Fonetastic and Block SMS and call had a high score
35% of the total FPs recorded high malware score. Table XII difference of 41 in favor of G M .
summarized many of such apps. We observed that apps like b) False negatives analysis: Table XIII and Figure 6(b)
Fonetastic, Block SMS and Call, Android Assistant, etc. had all showed False Negatives (FNs) analysis. Analogous to dan-
top ten dangerous permission pairs. Hence, they are detected gerous pairs, we define the term normal permission pairs;
as malicious with a high score. Besides, most of these normal i.e., pairs with the highest difference in favor of G N . The
apps indicated the signs of suspicious behavior. For instance, proposed model detected samples of 19 malware families as
they can block calls/SMS, kill apps, delete files, and disable FNs. Eight of them contained many of the top normal pairs.
features like Wi-Fi. Though our model detected such apps as The remaining ones did not include any of the top normal
malware, we observed that the majority of the FPs belong to permission pair, instead, they had a very less number of
the Social and Communication category of the normal apps. permissions (between two to five) as showed in Table XIII(b).
Interestingly, normal chat apps like TextPlus and Chaton, Edge weight of these pairs was almost equivalent in both the
too had the dangerous permission pairs, but they did not graphs with very little difference in favor of G N . 84% of the
pose any serious functionality. We tested other similar apps FNs had a score difference of less than or equal to one.
like WhatsApp and found that the proposed approach detected We conclude that our approach is effective in detecting
WhatsApp as malware with a low score difference of 0.04 in Android malware with an accuracy of 95.44%, and the
favor of G M . On the contrary, TextPlus and Chaton scored majority of the FPs (65%) and FNs (84%) had a very low
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
ARORA et al.: PERMPAIR: ANDROID MALWARE DETECTION USING PERMISSION PAIRS 1979
TABLE XIII
FALSE N EGATIVES A NALYSIS . ( A ) T OP N ORMAL P ERMISSION PAIRS IN M ALICIOUS A PPS . ( B ) L ESS N UMBER OF P ERMISSIONS IN M ALICIOUS A PPS
TABLE XIV
N UMBER OF E DGES R EMOVED IN G M AND G N A FTER E VERY
I TERATION OF P HASE 2 OF E DGE E LIMINATION
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
1980 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
G. Limitations
The proposed approach has some gray areas which we
intend to discuss in this subsection. The proposed model
Fig. 7. Comparison of the proposed approach with different anti-malware
apps. requires permission pairs to test the apps. Hence, the apps
containing single or no permission cannot be analyzed. Some
TABLE XVI of the malware samples with few permissions evade the detec-
C OMPARISON OF THE P ROPOSED A PPROACH W ITH E XISTING tion. Moreover, the proposed model gives relatively high FPR
P ERMISSIONS -BASED M ALWARE D ETECTION T ECHNIQUES . because many normal apps from Social and Communication
(a) TPR AND FPR. (b) P RECISION AND R ECALL category of the Google Play Store have been identified as
malicious due to the presence of dangerous permission pairs.
To evade detection, attackers may add widely used normal
permissions in the malware samples, thus, generating more
number of normal permission pairs. Besides, the proposed
approach does not focus on detecting colluding apps [56], [57].
To overcome these limitations, in the future, we will analyze
how efficiently other components such as intent filters, hard-
ware components, and API call logs can be used for detection,
in addition to the permissions. Since the proposed approach
each sample through VirusTotal. Figure 7 compared the results is static, malware with update capabilities (downloading of
of PermPair model with widely known anti-malware apps. malicious components at update time) may evade the detec-
We noticed that except QuickHeal, all of the anti-malware apps tion. To overcome this limitation, a dynamic detector can be
had a lower malware detection rate than PermPair. Quickheal deployed that could analyze the run time behavior of the apps.
detected 265 samples, three more than PermPair. Those three However, this will come at the cost of some computational
samples had single permission defined in their manifest file, overhead.
hence those three samples went undetected by our model.
We conclude that (a) our approach is relatively better than
eleven of the mobile anti-malware apps, and (b) most of V. C ONCLUSION AND F UTURE W ORK
the anti-malware apps are unable to detect newer malicious
In this paper, we proposed a novel approach for detecting
samples.
malicious apps by using permission pairs extracted from the
manifest files. We constructed the graphs to analyze permis-
F. Comparison With Existing Approaches sion pairs for both normal and malicious samples and assigned
In this subsection, we presented a comparative evaluation an edge weight to every pair depending upon the number
with other state-of-the-art permissions-based detection tech- of samples in which the pair is present. We subjected three
niques, though they used different datasets for their experi- malware datasets namely: Genome, Drebin, and Koodous to
ments. To the best of our knowledge, no other work in the analysis. The datasets contained the newer samples detected
literature used the same datasets as ours. Some of the works in 2014-18 in addition to the older samples, detected in 2010-
reported their results in TPR and FPR, whereas others mea- 2014. Initially, we constructed three different graphs; one for
sured Precision and Recall. Table XVI compared the detection each dataset and we observed certain deviations in permission
results of the proposed approach with other permissions- pairs of newer samples compared to the older ones. We merged
based solutions. The proposed approach gave nearly the same different malware graphs in a single graph using the weighted
detection rate as that of other related works which used sum method. We further performed edge elimination to remove
Precision and Recall for evaluation. Furthermore, the proposed the unnecessary edges. Results showed that our proposed
approach outperformed all the works in terms of TPR. The method is better than eleven of the popular mobile anti-
better performance of our approach was due to the dangerous malware apps. Our future work will focus on analyzing the
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
ARORA et al.: PERMPAIR: ANDROID MALWARE DETECTION USING PERMISSION PAIRS 1981
other components of the manifest file like intent filters and [22] V. Moonsamy, J. Rong, and S. Liu, “Mining permission patterns for
hardware components to increase the detection accuracy. contrasting clean and malicious Android applications,” Future Gener.
Comput. Syst., vol. 36, pp. 122–132, Jul. 2014.
[23] W. Wang, X. Wang, D. Feng, J. Liu, Z. Han, and X. Zang, “Exploring
ACKNOWLEDGMENT permission-induced risk in Android applications for malicious appli-
cation detection,” IEEE Trans. Inf. Forensics Security, vol. 9, no. 11,
We have taken the Genome dataset from the authors of [4], pp. 1869–1882, Nov. 2014.
Drebin [5] dataset from Institute for System Security, Tech- [24] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, you, get off of my
market: Detecting malicious apps in official and alternative Android
nische Universitat Braunschweig, Germany, and Koodous [6] markets,” in Proc. NDSS, 2012, pp. 50–52.
dataset from their website that hosts a large number of [25] D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu, “Droidmat:
malicious applications for analysis. We express deep gratitude Android malware detection through manifest and API calls tracing,” in
Proc. 7th Asia Joint Conf. Inf. Secur. (Asia JCIS), Aug. 2012, pp. 62–69.
to Genome, Drebin and Koodous projects for providing us the
[26] F. Idrees, M. Rajarajan, M. Conti, T. M. Chen, and Y. Rahulamathavan,
malware samples. “Pindroid: A novel Android malware detection system using ensemble
learning methods,” Comput. Secur., vol. 68, pp. 36–46, Jul. 2017.
[27] T. Kim, B. Kang, M. Rho, S. Sezer, and E. G. Im, “A multi-
R EFERENCES modal deep learning method for Android malware detection using
[1] Market Share Alert: Preliminary, Mobile Phones, Worldwide, Gartner, various features,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 3,
Stamford, CT, USA, 2017. pp. 773–788, Mar. 2019.
[2] 97% of Mobile Malware is on Android. This is the Easy Way You Stay [28] K. Sokolova, C. Perez, and M. Lemercier, “Android application classi-
Safe, Forbes Media, Jersey City, NJ, USA, 2014. fication and anomaly detection with graph-based permission patterns,”
[3] 2018 Malware Forecast: The Onward March of Android Malware, Decis. Support Syst., vol. 93, pp. 62–76, Jan. 2016.
Security Report, 2017. [29] H. Zhu, H. Xiong, Y. Ge, and E. Chen, “Mobile app recommendations
[4] Y. Zhou and X. Jiang, “Dissecting Android malware: Characteriza- with security and privacy awareness,” in Proc. ACM KDD, 2014,
tion and evolution,” in Proc. IEEE Symp. Secur. Privacy, May 2012, pp. 951–960.
pp. 95–109. [30] M. Fan et al., “Android malware familial classification and representative
[5] D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck, sample selection via frequent subgraph analysis,” IEEE Trans. Inf.
“DREBIN: Effective and explainable detection of Android malware in Forensics Security, vol. 13, no. 8, pp. 1890–1905, Aug. 2018.
your pocket,” in Proc. NDSS, 2014, pp. 23–26. [31] M. Zhang, Y. Duan, H. Yin, and Z. Zhao, “Semantics-aware Android
[6] Koodous Malware Dataset. Accessed: Nov. 25, 2019. [Online]. Avail- malware classification using weighted contextual API dependency
able: https://www.koodous.com graphs,” in Proc. ACM CCS, 2014, pp. 1105–1116.
[7] Android Developers Guide. Accessed: Nov. 25, 2019. [Online]. Avail- [32] A. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, “Android
able: https://developer.android.com/guide/index permissions demystified,” in Proc. ACM CCS, 2011, pp. 627–638.
[8] M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, “Unsafe exposure [33] Y. Feng, S. Anand, I. Dillig, and A. Aiken, “Apposcopy: Semantics-
analysis of mobile in-app advertisements,” in Proc. 5th ACM WiSec, based detection of Android malware through static analysis,” in Proc.
2012, pp. 101–112. 22nd ACM SIGSOFT Symp. Found. Softw. Eng., 2014, pp. 576–587.
[9] W. Enck, M. Ongtang, and P. McDaniel, “On lightweight mobile phone [34] K. O. Elish, X. Shu, D. Yao, B. G. Ryder, and X. Jiang, “Profiling user-
application certification,” in Proc. 16th ACM CCS, 2009, pp. 235–245. trigger dependence for Android malware detection,” Comput. Secur.,
[10] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, vol. 49, pp. 255–273, Mar. 2015.
“Android permissions: User attention, comprehension, and behavior,” in [35] W. Enck et al., “TaintDroid: An information-flow tracking system for
Proc. 8th Symp. Usable Privacy Secur., 2012, Art. no. 3. realtime privacy monitoring on smartphones,” ACM Trans. Comput.
[11] K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie, “PScout: Analyzing Syst., vol. 32, no. 2, 2014, Art. no. 5.
the Android permission specification,” in Proc. 19th ACM CCS, 2012, [36] V. Rastogi, Y. Chen, and W. Enck, “AppsPlayground: Automatic security
pp. 217–228. analysis of smartphone applications,” in Proc. ACM CODASPY, 2013,
[12] S. Holavanalli et al., “Flow permissions for Android,” in Proc. 28th pp. 209–220.
IEEE/ACM Int. Conf. Automated Softw. Eng., Nov. 2013, pp. 652–657. [37] M. Sun, T. Wei, and J. C. S. Lui, “TaintART: A practical multi-level
[13] M. Grace, Y. Zhou, Z. Wang, and X. Jiang, “Systematic detection of information-flow tracking system for Android runtime,” in Proc. ACM
capability leaks in stock Android smartphones,” in Proc. NDSS, 2012, CCS, 2016, pp. 331–342.
p. 19.
[38] Z. Yang, M. Yang, Y. Zhang, G. Gu, P. Ning, and X. S. Wang,
[14] B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, P. G. Bringas, and
“AppIntent: Analyzing sensitive data transmission in Android for privacy
G. Álvarez, “PUMA: Permission usage to detect malware in Android,” in
leakage detection,” in Proc. ACM CCS, 2013, pp. 1043–1054.
Proc. Int. Joint Conf. CISIS’12-ICEUTE’12-SOCO’12 Special Sessions.
[39] A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss,
Berlin, Germany: Springer, 2013.
“‘Andromaly’: A behavioral malware detection framework for Android
[15] B. Sanz et al., “MAMA: Manifest analysis for malware
devices,” J. Intell. Inf. Syst., vol. 38, no. 1, pp. 161–190, 2011.
detection in Android,” Cybern. Syst., vol. 44, nos. 6–7,
pp. 469–488, 2013. [40] A. Reina, A. Fattori, and L. Cavallaro, “A system call-centric analysis
[16] K. A. Talha, D. I. Alper, and C. Aydin, “APK Auditor: Permission-based and stimulation technique to automatically reconstruct Android malware
Android malware detection system,” Digital Invest., vol. 13, pp. 1–14, behaviors,” in Proc. 6th Eur. Workshop Syst. Secur., 2013, pp. 1–6.
Jun. 2015. [41] V. M. Afonso, M. F. de Amorim, A. R. A. Grégio, G. B. Junquera, and
[17] G. Tao, Z. Zheng, Z. Guo, and M. R. Lyu, “MalPat: Mining patterns of P. L. de Geus, “Identifying Android malware using dynamically obtained
malicious and benign Android apps via permission-related APIs,” IEEE features,” J. Comput. Virology Hacking Techn., vol. 11, no. 1, pp. 9–17,
Trans. Rel., vol. 67, no. 1, pp. 355–369, Mar. 2018. 2015.
[18] L. Cen, C. S. Gates, L. Si, and N. Li, “A probabilistic discriminative [42] S. Wang, Q. Yan, Z. Chen, B. Yang, C. Zhao, and M. Conti, “Detecting
model for Android malware detection with decompiled source code,” Android malware leveraging text semantics of network flows,” IEEE
IEEE Trans. Depend. Secure Comput., vol. 12, no. 4, pp. 400–412, Trans. Inf. Forensics Security, vol. 13, no. 5, pp. 1096–1109, May 2018.
Jul./Aug. 2015. [43] A. Shabtai, L. Tenenboim-Chekina, D. Mimran, L. Rokach, B. Shapira,
[19] H. Peng et al., “Using probabilistic generative models for ranking risks and Y. Elovici, “Mobile malware detection through analysis of devia-
of Android apps,” in Proc. ACM CCS, 2012, pp. 241–252. tions in application network behavior,” Comput. Secur., vol. 43, no. 6,
[20] N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning pp. 1–18, 2014.
aided Android malware classification,” Comput. Elect. Eng., vol. 61, [44] Z. Chen et al., “A first look at Android malware traffic in first few
pp. 266–274, Jul. 2017. minutes,” in Proc. IEEE Trustcom, Aug. 2015, pp. 206–213.
[21] H.-J. Zhu, Z.-H. You, Z.-X. Zhu, W.-L. Shi, X. Chen, and L. Cheng, [45] A. Arora, S. Garg, and S. K. Peddoju, “Malware detection using network
“DroidDet: Effective and robust detection of Android malware using traffic analysis in Android based mobile devices,” in Proc. 8th Int. Conf.
static analysis along with rotation forest model,” Neurocomputing, Next Gener. Next Gener. Mobile Apps, Services Technol., Sep. 2014,
vol. 272, pp. 638–646, Jan. 2018. pp. 66–71.
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.
1982 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 15, 2020
[46] A. Arora and S. K. Peddoju, “Minimizing network traffic features for Sateesh K. Peddoju (SM’18) has been with IIT
Android mobile malware detection,” in Proc. 18th Int. Conf. Distrib. Roorkee, India, since 2010. He has publications in
Comput. Netw., 2017, Art. no. 32. reputed journals like IEEE P OTENTIALS , MTAP,
[47] A. Saracino, D. Sgandurra, G. Dini, and F. Martinelli, “MADAM: WPC, and IJIS and conferences, including Trust-
Effective and efficient behavior-based Android malware detection and Com, MASS, ICDCN, and ISC. His research inter-
prevention,” IEEE Trans. Depend. Sec. Comput., vol. 15, no. 1, ests include cloud computing, ubiquitous computing,
pp. 83–97, Jan./Feb. 2018. high-performance computing and security. He is
[48] M. Sun, X. Li, J. C. S. Lui, R. T. B. Ma, and Z. Liang, “Monet: currently a Senior Member of ACM. He was a
A user-oriented behavior-based malware variants detection system recipient of University Rank and scholarship, and
for Android,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 5, several Best Paper Awards and Best Teacher Award.
pp. 1103–1112, May 2017. He is also the Secretary of the IEEE Roorkee section,
[49] M. Xia, L. Gong, Y. Lyu, Z. Qi, and X. Liu, “Effective real-time Android the Vice-Chair of IEEE Computer Society, India council, and a Founding
application auditing,” in Proc. IEEE Symp. Secur. Privacy, May 2015, Faculty Advisor of ACM Student Chapter-IIT Roorkee. He is also a Reviewer
pp. 899–914. of top-rated journals like IEEE TCC, IEEE TSC, MTAP, COSE, COMNET,
[50] M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, “Riskranker: and JNCA. He is also the Founding General Co-Chair of SLICE-2018 and the
Scalable and accurate zero-day Android malware detection,” in Proc. General Chair of DSEA-2018. He is in several conferences like IEEE MASS,
10th Int. Conf. Mobile Syst., Appl., Services, 2012, pp. 281–294. IEEE ATC, IEEE SmartComp, IEEE iNIS, and IoTSMS.
[51] A. Arora and S. Peddoju, “NTPDroid: A hybrid Android malware
detector using network traffic and system permissions,” in Proc. 17th
IEEE TrustCom, Aug. 2018, pp. 808–813.
[52] A. Arora, S. K. Peddoju, V. Chouhan, and A. Chaudhary, “Hybrid
Android malware detection by combining supervised and unsupervised
learning,” in Proc. 24th ACM MobiCom, 2018, pp. 798–800.
[53] K. Atkinson, An Introduction to Numerical Analysis. Hoboken, NJ, USA: Mauro Conti (SM’14) received the Ph.D. degree
Wiley, 2008. from the Sapienza University of Rome, Italy,
[54] Contagio Mobile Malware Dump. Accessed: Nov. 25, 2019. [Online]. in 2009. After then, he was a Post-Doctoral
Available: https://www.contagiominidump.blogspot.com Researcher with Vrije Universiteit Amsterdam, The
[55] S. Chen et al., “Automated poisoning attacks and defenses in malware Netherlands. In 2011, he joined the University of
detection systems: An adversarial machine learning approach,” Comput. Padua as an Assistant Professor, where he became
Secur., vol. 73, pp. 326–344, Mar. 2018. an Associate Professor in 2015, and a Full Professor
[56] S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, A. R. Sadeghi, and in 2018. He was a Visiting Researcher with GMU
B. Shastry, “Towards taming privilege-escalation attacks on Android,” in 2008 and 2016, UCLA in 2010, UCI from 2012
in Proc. 19th Annu. Netw. Distrib. Syst. Secur. Symp., 2012, p. 19. to 2014, and in 2017, TU Darmstadt in 2013, UF
[57] K. Elish, H. Cai, D. Barton, D. Yao, and B. Ryder, “Identifying mobile in 2015, and FIU from 2015 to 2016. He was
inter-app communication risks,” IEEE Trans. Mobile Comput., to be awarded with a Marie Curie Fellowship in 2012 by the European Commission,
published. and with a Fellowship by the German DAAD in 2013. He is currently a Full
Professor with the University of Padua, Italy, and an Affiliate Professor with
Anshul Arora is currently pursuing the Ph.D. the University of Washington, Seattle, USA. His research is also funded by
degree from the Department of Computer Science companies, including Cisco and Intel. His main research interests include
and Engineering, IIT Roorkee, India, under the security and privacy. In this area, he published more than 200 articles
guidance of Dr. S. K. Peddoju. He is also an in topmost international peer-reviewed journals and conference. He is also
Assistant Professor of discipline of mathematics and an Area Editor-in-Chief of the IEEE C OMMUNICATIONS S URVEYS AND
computing with the Delhi Technological University T UTORIALS , and an Associate Editor for several journals, including the
Delhi, India. His research interests include mobile IEEE C OMMUNICATIONS S URVEYS AND T UTORIALS , the IEEE T RANS -
security, mobile malware detection, and network ACTIONS ON I NFORMATION F ORENSICS AND S ECURITY , and the IEEE
traffic analysis. T RANSACTIONS ON N ETWORK AND S ERVICE M ANAGEMENT. He was the
Program Chair of TRUST 2015, ICISS 2016, WiSec 2017, and the General
Chair of SecureComm 2012 and ACM SACMAT 2013.
Authorized licensed use limited to: DELHI TECHNICAL UNIV. Downloaded on July 19,2022 at 07:21:07 UTC from IEEE Xplore. Restrictions apply.