A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
Abstract— Currently, Android malware detection is mostly time detection performance and accuracy on different mobile
performed on server side against the increasing number of devices; (5) the potential based on the evolution trend of mobile
malware. Powerful computing resource provides more exhaustive devices’ specifications; and finally we further propose a practical
protection for app markets than maintaining detection by a single solution (MobiTive) to detect Android malware on mobile devices.
user. However, apart from the applications (apps) provided by
the official market (i.e., Google Play Store), apps from unofficial Index Terms— Android malware, malware detection, deep
markets and third-party resources are always causing serious neural network, mobile platform, performance.
security threats to end-users. Meanwhile, it is a time-consuming
task if the app is downloaded first and then uploaded to the I. I NTRODUCTION
server side for detection, because the network transmission has
a lot of overhead. In addition, the uploading process also suffers
from the security threats of attackers. Consequently, a last line
of defense on mobile devices is necessary and much-needed.
W ITH the currently increasing number of Android
devices and applications (apps), plenty of Android
users are benefited from that. The security and privacy con-
In this paper, we propose an effective Android malware detection cerns are also increasingly becoming the focus point to various
system, MobiTive, leveraging customized deep neural networks mobile users and stakeholders. For example, more and more
to provide a real-time and responsive detection environment on users store their personal data in mobile devices [1], [2]
mobile devices. MobiTive is a pre-installed solution rather than through various popular apps such as shopping, banking, and
an app scanning and monitoring engine using after installation,
which is more practical and secure. Although a deep learning-
social apps. Consequently, since the last decade, attackers shift
based approach can be maintained on server side efficiently their attention to mobile apps. That makes Android malware
for malware detection, original deep learning models cannot undoubtedly become one of the most important security threats
be directly deployed and executed on mobile devices due to in this security field [3], [4].
various performance limitations, such as computation power, Therefore, how to detect Android malware becomes a
memory size, and energy. Therefore, we evaluate and investi- severe problem. End-users always expect a secure environment
gate the following key points: (1) the performance of different which is maintained by the app markets. In other words, they
feature extraction methods based on source code or binary
consider their app sources are all trustable and secure enough.
code; (2) the performance of different feature type selections for
deep learning on mobile devices; (3) the detection accuracy of It is not surprising that the demands of Android malware
different deep neural networks on mobile devices; (4) the real- detection approaches have been proposed, such as signature-
based approaches [5], [6], behavior-based approaches [7], [8],
data-flow analysis-based approaches [9], [10]. We note that
Manuscript received April 5, 2020; revised August 4, 2020; accepted
August 31, 2020. Date of publication September 23, 2020; date of current machine learning-based approach [11]–[18] is one of the
version December 11, 2020. This work was supported in part by the Singapore most promising techniques in detecting Android malware.
Ministry of Education Academic Research Fund Tier 1 under Award 2018-T1- With the available big data and hardware evolution over the
002-069, in part by the National Research Foundation, Prime Ministers Office,
Singapore through its National Cybersecurity Research and Development
past decade, deep learning has achieved tremendous success
Program under Award RF2018 NCR-NCR005-0001, in part by the Singapore in many cutting-edge domains, including Android malware
National Research Foundation through NCR under Award NSOE003-0001, detection. Actually, all of the above protecting solutions are
in part by the NRF Investigatorship under Grant NRFI06-2020-0022, in part by mostly on server side for app markets. However, when a new
the National Research Foundation, Prime Ministers Office, Singapore through
NCR under Award NRF2018NCR-NSOE004-0001, in part by the National
Android malware family is reported, not all the app markets
Natural Science Foundation of China under Grant 61902395, and in part by are able to respond in a responsive time. The current analysis
the NVIDIA AI Tech Center (NVAITC). The associate editor coordinating the workflow always follows analyzing malicious behaviors within
review of this manuscript and approving it for publication was Prof. Debdeep apps, building the detection models with the generated features
Mukhopadhyay. (Corresponding author: Sen Chen.)
Ruitao Feng, Xiaofei Xie, Shang-Wei Lin, and Yang Liu are with the and then performing the detection on the entire apps. Since
School of Computer Science and Engineering, Nanyang Technological Uni- the number of the real-world Android apps is extremely
versity, Singapore 639798 (e-mail: [email protected]; [email protected]; large, e.g., there are more than 3 million Android apps on
[email protected]; [email protected]). Google Play Store, it is a time-consuming task to perform the
Sen Chen is with the College of Intelligence and Computing, Tianjin
University, Tianjin 300350, China, and also with the School of Computer Sci- complete detection with that large number of apps. Moreover,
ence and Engineering, Nanyang Technological University, Singapore 639798 the apps from unofficial markets and third-party resources like
(e-mail: [email protected]). XDA [19] are more vulnerable in the wild. The security of
Guozhu Meng is with the Institute of Information Engineering, Chinese
Academy of Sciences, Beijing 100864, China (e-mail: mengguozhu@
these kinds of apps is indeed unpredictable and uncontrollable.
iie.ac.cn). The traditional server-side based malware detection surely
Digital Object Identifier 10.1109/TIFS.2020.3025436 has unignorable drawbacks when detecting such apps, because
1556-6013 © 2020 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
1564 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 16, 2021
(1) it is a time-consuming task to upload the apps to server such as dynamic behavior analysis to demonstrate the
before the installation, especially for large apps; (2) the effectiveness of our approach. We also investigate the
uploading process via the Internet is not secure. For example, development trend of Android mobile phones to further
attackers may modify the malware during the uploading period understand the system usability.
such that an incorrect “benign” result is returned. As a result, According to the evaluation metrics of accuracy and time
the users will install the malware. Hence, a last line of defense cost from different features and neural networks, we propose
on mobile devices is necessary and much-needed. To address an effective and efficient Android malware detection system
the severe problem, we intend to conduct Android malware on mobile devices, named MobiTive. MobiTive leverages (1) a
detection on mobile devices instead of server side. newly-proposed feature extraction method from binary code;
Actually, machine learning-based approaches have achieved (2) a performance-based feature type selection mechanism;
better performance compared with other approaches in (3) a novel feature updating method through malicious behav-
Android malware detection [11], [13], [17], [20], [21]. In this ior mining and understanding; (4) a customized deep neural
paper, we intend to deploy the trained deep learning (DL) network for classification. So that, MobiTive can provide a
models from server-side to mobile devices. While a compu- real-time and fast responsive environment on mobile devices.
tationally intensive deep learning software could be executed In our comprehensive experiments, (1) we first divide the
efficiently on server-side with the GPU support, such deep feature preparation procedure into two steps, which are raw
learning models usually cannot be directly deployed and data extraction and feature extraction, and evaluate the perfor-
executed on other platforms supported by small mobile devices mance (time cost) separately to decide the feature selection.
due to various computation resource limitations such as the (2) With the selected features, we then provide an accu-
computation power, memory size, and energy. In our previous racy comparison between different feature categories. (3) The
work [23], we leverage TensorFlow Lite [24] to migrate the behavior-based feature updating method performs around
deep learning models. We proposed a convolutional neural 1%∼5% accuracy increase. (4) We provide a comprehensive
network (CNN)-based Android malware detection system on comparison between seven different neural networks (e.g.,
mobile platform, which leveraged three kinds of features from CNN, LSTM, and GRU) to show the potential improvement
decompiled Android apps according to the performance-based of our customized DL models on network definition. (5) We
feature selection mechanism. We have substantially extended further evaluate the performance and accuracy of MobiTive on
our previous work from the following aspects: different real mobile devices by using our customized RNN
• In the conference version [23], we only focused on the model and compare with dynamic device-end solutions. (6)
performance of different feature types extracted from In the last part of our experiments, we perform an analy-
decompiled files such as smali files. To reach the best sis of the performance trend on mobile devices from three
performance on mobile devices, we take the installation different aspects and integrate the results to provide a strong
mechanism in the Android operation system into account. evidence on the potential of MobiTive in practice. Specifically,
Specifically, we analyze and extract two types of features MobiTive achieves a relatively higher classification accuracy
(i.e., manifest properties and API calls) from Dalvik (i.e., 96.78% accuracy) on real testing data in the wild and
binary files directly instead of the decompiled files. mobile devices with relatively lower overhead (i.e., less than
• Meanwhile, to enrich the malicious behavior coverage of 3 seconds on average for one app).
our selected features, we perform an empirical analysis In summary, we make the following main contributions.
to understand the existing malicious behaviors, most of • We propose MobiTive, a device-end solution to protect
which are collected from industrial malware analysis mobile devices from malware threats in real-time effi-
reports (e.g., Symantec Threats [25]). According to the ciently by leveraging customized deep neural networks
understanding, we further update the feature inputs with and binary features. This research work aims to detect
the matching results between text-based behavior descrip- malware directly on mobile devices as a pre-installed and
tions and code level features (details on our website [26]). run-time solution rather than detecting them on common
• To figure out the potential detection accuracy promotion servers or monitoring them after installation.
of different deep neural networks, we not only apply • We propose a new feature extraction method from binary
our new extracted features with CNN models, but also code, as well as a feature updating method based on
present six more kinds of recurrent neural networks mod- the understanding of malicious behaviors. Due to the
els (e.g., LSTM and GRU). Finally, we customized one high performance demand of mobile devices, we evaluate
RNN model to adopt the device-based detection scenario. the different performance (time cost) and accuracy with
Moreover, we further compare with four other existing various feature types and neural networks, and further
Android malware detection approaches to demonstrate the provide a comparison against four existing Android mal-
effectiveness and efficiency of our approach. ware detection approaches. Besides, we also investigate
• To investigate the effectiveness of our system on multi- the accuracy on multi-class classification task.
class classification task, we demonstrate the result on • We investigate the different performance on multiple
classifying 701,300 Android malware into 21 families devices from different manufacturers, and further pro-
with our system. vide insights of the current quality and potential for
• To peek into the average usability and best practice our approach according to the feature extraction and
for our new system, we evaluate our system on six prediction time cost on six real mobile devices. Mean-
real mobile devices from different manufacturers such as while, an additional comparison on run-time efficiency
Google, Huawei, and Samsung, which released between and discussion on effectiveness is provided to show the
2015 and 2019. Meanwhile, we conduct a run-time advantages against dynamic malware detection system
performance evaluation with other device-end solution based on behavior analysis.
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
FENG et al.: PERFORMANCE-SENSITIVE MALWARE DETECTION SYSTEM USING DL ON MOBILE DEVICES 1565
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
1566 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 16, 2021
Fig. 1 shows that the second part loads the quantized DL TABLE I
model and feature dictionary into mobile devices. After that, S ELECTED F EATURES
when an application is downloaded from market or third-
party market, MobiTive can extract feature vectors from it and
deliver the result to MobiTive (steps →
A ).
C After predicting
with the loaded DL model, we obtain a certain level of
confidence based on predictive output to know whether the
downloaded Android app is a malware or not. (steps → D ).E
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
FENG et al.: PERFORMANCE-SENSITIVE MALWARE DETECTION SYSTEM USING DL ON MOBILE DEVICES 1567
TABLE II TABLE IV
D EEP N EURAL N ETWORK A RCHITECTURE : GRU AND LSTM D EEP N EURAL N ETWORK A RCHITECTURE :
B IDIRECTIONAL GRU AND LSTM
TABLE III
D EEP N EURAL N ETWORK A RCHITECTURE : TABLE V
S TACKED GRU AND LSTM D EEP N EURAL N ETWORK A RCHITECTURE : CNN
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
1568 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 16, 2021
2) DL Model Migration and Quantization: To deploy our API provided in Keras (2.2.4), the basic data structure used
pre-trained DL model on mobile devices, we convert and in the computation with TensorFlow Lite (0.0.0-nightly) on
migrate the pre-trained model to a TensorFlow Lite model, Android devices is bytebuffer. Thus, firstly, there will be a
which is supported by Android operating system (step ). 6 step to convert the input vector and model into bytebuffer
Specifically, we migrate the TensorFlow model to a mobile format. Secondly, by loading the model into a TensorFlow Lite
readable TensorFlow Lite model with a TensorFlow Lite con- interpreter, we can feed the input bytebuffer into the interpreter
verter [24]. Apart from the model migration, we also quantize and get the result matrix. At last, by using an argmax function
our pre-trained model to improve the performance on mobile on the result matrix, the final prediction result can be obtained.
devices, which does not affect the accuracy of detection much. IV. E XPERIMENTS
In the experiments, we measure the performance of accuracy
and time cost affected by the model migration and quantization In this section, our experiments are technically organized
(details in § IV-C.3). into three subsections based on the model deployment envi-
ronments (i.e., PC/server and mobile). First, the goals of our
D. Real-Time Detection System experiments on PC/server are to investigate: (1) the perfor-
Before conducting a real-time detection, the quantized Ten- mance of extraction time of different raw data (techniques)
sorFlow Lite model and feature dictionary should be deployed and feature types; (2) the effectiveness of behavior-based fea-
to the detection system in advance (step ).7 There are three ture updating method; (3) the detection accuracy of different
main steps before completing the prediction. The first step deep neural networks; (4) the comparison with other existing
of MobiTive is feature preparation. When an APK file is learning-based Android malware detection solutions; (5) the
received in step , A MobiTive first unzips it into original accuracy of multi-class classification on malware families.
assembly files such as AndroidManifest.xml, classes.dex, and Second, based on the observed findings and obtained results,
other resources. Features of API calls and manifest properties we further evaluate: (1) the performance of feature preparation
will be extracted accordingly. We implement an API parser to on six different real devices with six different app sizes
extract the API calls from classes.dex directly based on the from 5MB to 50MB; (2) the efficiency of detecting with
understanding of Dalvik binary code. Since the raw binary different RNN models on real devices; (3) the usability (i.e.,
AndroidManifest.xml cannot be analyzed directly, we use a performance and accuracy) of MobiTive on six different real
third-party decoder library, AXML [35], to get the decoded mobile devices; (4) the efficiency of MobiTive by comparing
manifest file. By analyzing the decoded manifest file, the three to dynamic behavior-based run-time detection systems.
kinds of manifest properties will be extracted from the XML In the end, we conduct a study on the hardware performance
tag. Hence, we can get both the manifest property vector and trend of Android mobile devices to provide insights into the
API call vector in step . B All the two types of features are future usability of MobiTive.
transformed into a vector, we connect them together as the
input of TensorFlow Lite model (step ). C With the quantized
model, MobiTive can perform the prediction in step D and A. Experiment Environment
show the final prediction result as a feedback in step .E With The experiments on server side are run on a Ubuntu
the prediction result, the system can raise a warning to help 16.04 server with two Intel Xeon E5-2699 V3 CPUs, 192GB
users blocking the installation of the detected malware and RAM, and NVIDIA GeForce 2080Ti GPU. To evaluate our
further save its information (e.g., name, version, checksum) approach, we select 6 different Android mobile devices to
in local database. Also, besides the actions on local devices, evaluate the performance and accuracy of our approach on
reporting the malicious applications’ information to the corre- real mobile devices. Among them, there are four common
sponding market and synchronizing the malware information specification devices (Nexus 6P, Huawei Mate 10, HTC U11,
to the updating server can be another two options. and LG G6), a flagship device (Huawei P30), and a low-profile
To deploy an update for the MobiTive in practice, the ser- device (Samsung Galaxy J7 Pro) (detailed specifications pro-
vice provider firstly need to collect the new detected malware vided on our website [26]). The implementation language of
and update the training dataset. After updating, it will be able our system on server is Python 3. To get access to the raw
to obtain a new pre-trained model on server. Then, the new data and features, we use seven different kinds of existing
model can be packed as a system patch and deployed to tools, which are axmldec [34], AXML [35], ApkTool [37],
devices within an update directly. As a result, the updated AndroGuard [38], Dex2jar [36], Soot [39], and FlowDroid [9].
system surely will improve the effectiveness and robustness axmldec is a C++ project which can be used to decode
of the protection on device based on the new delivered model. binary manifest file into readable XML format file. AXML
More implementation details: The AXML version used in is a library designed to parse binary Android XML files. It
MobiTive is v1.0.1. The API parser used in MobiTive on is written in Java and can be used in an Android app as an
Android devices is implemented based on the Dex2jar [36] external library. ApkTool is a tool for reverse engineering,
(2.1-nightly-28). Unlike the original Dex2jar project, we do which can decompile the apk file and generate the resources,
not decompile the Dalvik executable files (i.e.,.dex files) back which contains manifest, smali files, and etc. AndroGuard is
into.smali files or .class files. Instead, we only involve the a Python tool, which cannot only decode the resources but
binary formatting functions in Dex2jar and collect the API also disassemble bytecode to Java code. Also, with the help
calls from the decoded API table. The API parser is served as of AndroGuard, we can easily generate the call graphs (CG)
an external lib file in the MobiTive. Technically, the classifica- and data-flow graph for an Android app. Dex2jar is a project
tion functionality of MobiTive on Android devices is consist which contains tools to work with Android .dex and Java .class
of 3 main parts. Different from the well established high level files. Soot is a Java optimization framework, which can be
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
FENG et al.: PERFORMANCE-SENSITIVE MALWARE DETECTION SYSTEM USING DL ON MOBILE DEVICES 1569
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
1570 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 16, 2021
TABLE VIII
§III-B.2 by comparing the results between the features used D ETECTION R ESULTS OF F EATURE C ATEGORIES AND N ETWORKS
in our previous work [23] (MobiDroid) and MobiTive.
a) Dataset: As shown in Table VI, we collect more
than 70k Android apps in total as our evaluation subject.
Specifically, these apps consist of 29,010 Android malware,
and others are benign apps crawled from Google Play Store.
However, these might be malware on the official market. To
filter the potential malware as far as possible, we upload
them to VirusTotal [44], which is an online antivirus service
with over 60 security scanners, to make a verification. The
29,010 malicious samples contain 5,560 apps that downloaded
from Drebin [11], 1,260 apps validated in Genome project [3],
20,000 crawled from VirusShare, and the remaining are used we first evaluate the effect of two newly-updated feature
in KuafuDet [17], including 360 from Contagio Mobile Web- categories (Table I) on detection accuracy separately. Second,
site [45] and 1,830 from Pwnzen Infotech Inc., [46]. In we investigate the effect of computational architecture in
summary, we collect a large-scale dataset of benign and mali- different deep neural networks on detection accuracy.
cious samples for the following experiments. Since our dataset a) Dataset: The dataset configuration used in this exper-
comes from multiple sources, there have a lot of duplicated iment is same as §IV-B.2.a (Table VI).
samples. Therefore, we perform a hash check for eliminating b) Setup: To find out the correlation between the two
redundant apps among malicious and benign apps. During selected features (i.e., manifest properties and API calls),
the data prepossessing, which has raw data decompiling and we investigate their corresponding accuracy by accepting both
feature vector generation steps, we receive some failed cases single and combined feature categories as the input of a same
due to the capabilities of API parser. The rest of the failures are neural network with a same training data configuration. To
just caused by the broken APK packages, we also remove them determine the best deep neural network, we evaluate seven
directly. As a result, we choose 18,000 benign and malicious widely-used neural networks by using the combined two
samples respectively from our dataset to conduct the following feature categories.
experiments. In training stage, we divide these 18,000 malware c) Results: We demonstrate the results from the 2 aspects
and 18,000 benign apps into three parts, 80% of them are (feature category selection and network selection) as below.
configured as training data, other 20% are equally split into (1) Feature selection: As shown in Table VIII, the accuracy
validating and testing data. of the three CNN models is 79.89%, 93.17% and 95.11%. By
b) Setup: Because our previous work MobiDroid [23] comparing the accuracy of feature categories, we decide to use
applied three types of features (i.e., API calls, manifest prop- manifest properties and API calls together as an input bundle
erties, and opcode sequence), in this experiment, we determine in our approach since the input with two feature types has the
to take API calls and manifest properties (i.e., 1,509 and 613), best result.
which our behavior-based feature updating method may benefit (2) Network selection: In general, RNN models perform
on, as the feature of MobiDroid to reveal the improvement on a better accuracy than CNN models. A possible reason is
detection. Meanwhile, the updated version used in MobiTive that RNN has an internal state (memory), which can also
has 2,290 API calls and 625 manifest properties. For each take the correlation between the different feature positions
feature version, we apply three kinds of deep neural networks, into consideration. In the training stage, this internal state will
which presented in §III-C.1, to investigate whether the feature make RNN be able to keep the highly potential related in a
updating method can improve the accuracy of our system. long-term and finally keeps the most corresponding feature
c) Results: In Table VII, the accuracy of updated feature positions. However, CNN considers every different feature
version on CNN, LSTM and GRU is 95.11%, 96.56% and position individually in training. In terms of RNN mod-
96.75%. Comparing to the previous results, there is around els, GRU and bidirectional GRU achieve a similar accuracy
1%∼5% improvement after feature updating. Therefore, based (96.75% vs. 96.78%), which is better than other RNN models’
on the result, we accept updating features summarised from accuracy. They also have a better recall than precision (96.78%
potential malicious behaviors a part of our input feature set. vs. 96.72% for GRU and 97.00% vs. 96.57% for Bidirectional
3) Accuracy Evaluation of Feature Category Selection and GRU). Besides, we also compare the size of original pre-
Deep Neural Network Selection: In this experiment, to find trained model with the quantized and non-quantized models.
out the correlation between selected features and the effective- In Fig. 4, we can find that the size of the original pre-
ness of different deep neural networks on detection accuracy, trained model reduces 3 times on RNNs and 5 times on
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
FENG et al.: PERFORMANCE-SENSITIVE MALWARE DETECTION SYSTEM USING DL ON MOBILE DEVICES 1571
TABLE IX
C OMPARISON OF M OBI T IVE A GAINST E XISTING A PPROACHES
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
1572 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 16, 2021
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
FENG et al.: PERFORMANCE-SENSITIVE MALWARE DETECTION SYSTEM USING DL ON MOBILE DEVICES 1573
TABLE XI
RUN -T IME P ERFORMANCE C OMPARISON OF M OBI T IVE
A GAINST DYNAMIC A NDROID A NALYSIS T OOL
Fig. 7. The accuracy and prediction time of RNN models on Huawei P30.
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
1574 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 16, 2021
TABLE XII
A CCURACY AND P ERFORMANCE OF M OBI T IVE ON R EAL M OBILE D EVICES
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
FENG et al.: PERFORMANCE-SENSITIVE MALWARE DETECTION SYSTEM USING DL ON MOBILE DEVICES 1575
and API calls) surely will not cause large overhead when it the entire Android app with a limited feature list instead of
is working on an Android device. However, the limited two embedding the whole package program, so that the attackers
feature types will also provide limited information from the have to manipulate their malware applications with our defined
Android malware. If there will be a new malware family, features to bypass MobiTive. In practice, attackers can not
whose malicious behaviors can not be represented by our obtain the accurate feature list easily. Meanwhile, considering
selected feature types, the MobiTive may not be able to detect that most of our selected features (i.e., manifest properties
them. In the future, we aim to add more effective feature types and API calls) are defined by the official/trustworthy third-
with low-performance costs as well. party developers, it is almost impossible to bypass MobiTive
Meanwhile, it is very important to detect new malware fam- as easily as the deep learning based voice/image recognition
ilies in practice. Actually, neither dynamic nor static methods systems under the restriction of maintaining the functionalities
can fully guarantee the validity of protection against the new in the malware applications. All in all, adversarial attacks
malware samples. A possible solution for detecting more new on deep learning based malware have domain-specific chal-
malware is that combining two types of methods. In the future, lenges compared with image/voice classification, which is also
we will try to improve the ability to detect new malware belonging to a new research direction as an open question.
by designing a new adaptive method, which is also an open
question for this community. D. Dynamic Behavior Analysis
According to our knowledge and an in-depth literature
B. New Malware Family Detection review, static analysis acts an important in past and current
For any malware detection tool, it is no doubt that detect- cyber security research, and the number of research pub-
ing new malware families in practice is a very important lications on Android malware detection is also larger than
task. However, neither dynamic nor static methods can fully dynamic analysis (static analysis [11], [18], [20], [32], [33],
guarantee the validity of protection against the new malware [57]–[65] vs. dynamic analysis [7], [66]–[70]). Indeed, on a
samples. For example, due to the limited training dataset, specific given detection task, dynamic behavior analysis may
MobiTive would have a similar limitation as other static analy- achieve a more accurate result (e.g., lower false positive)
sis based malware detection systems, which is different from than static analysis, however, there are several limitations,
the dynamic analysis approaches. Specifically, considering a which undertake its applicability on specific scenarios, need
new malware family, the situation may be that the malicious to be discussed. (1) First and most important, the avail-
features are totally different from existing data. Consequently, able scenarios of dynamic behavior analysis based malware
as a result of lack of knowledge, the trained classifier may not detection systems are more limited, because the high cost
be able to make the right decision, although learning-based on computational resources makes dynamic behavior analy-
approaches sometimes have the ability to detect new malware sis based systems unable to satisfy users’ requirements on
variants. Therefore, in the future, we can make some efforts performance and energy. For example, using performance
to improve the ability to detect new samples by combining counter [67] while doing program analysis in malware/bug
varies techniques. We surely will also try to improve the ability detection task is widely used. However, unlike traditional
to detect new malware by designing new adaptive methods, windows/linux programs, Android application have a more
which will also benefit the community by discovering the complicated HCI mechanism. In other word, generating good
possible techniques on solving this open question. quality test benchmarks with a good coverage to the corner
cases is much more difficult than programs on windows/linux.
C. Against Adversarial Attack Assuming we have the ability to obtain the benchmarks,
the time cost in generating and executing them will also bring
Indeed, deep learning based systems (e.g., voice/image
a conflict to the target, which is satisfying user’s demand
recognition) will suffer from adversarial attacks [52]–[55],
on efficiency. (2) Second, the detection efficiency is highly
so that maintaining the robustness of deep learning based
depend on the coverage of the predefined behaviors. Namely,
system becomes a challenging topic. However, there are sev-
once the malicious behavior in the target malware is not
eral differences in the deep learning based systems between
specifically defined by the detection system, the security of
malware detection task and voice/image recognition. (1) First
system will be no longer promised. (3) Third, different from
and most important, unlike voice/image recognition, the adver-
MobiTive, dynamic behavior analysis based system may suffer
sarial attacks in malware detection cannot break the entire
from its working mechanism (i.e., before installation vs. run-
functionality in the applications easily in practice, so that
time). For example, a social engineering based spyware can
the existing adversarial attacks against malware detection
easily store the privacy information on the device and trick
are always generated by manipulating the target malware
the user to upload them, as a result of that most users are not
application with un-triggered code snippets (e.g., dead code)
as professional as security researchers. In the end, according
instead of changing real functionalities [56]. Although it is
to the diverse usage scenarios and targets, we think Android
able to generate adversarial samples to evade the classifier
malware detection approaches based on dynamic behavior and
and achieve a high miss-classification rate, it is impractical
static analysis have their own advantages and weaknesses
so far, because such attack can be easily detected by lever-
respectively, which both call for research on them.
aging other techniques such as static data flow analysis to
delete such features that are introduced by adding dead code VI. R ELATED W ORK
from attackers. Meanwhile, it is also evidenced by lacking Some techniques are proposed based on analyzing the XML
real adversarial malware samples in the existing researches. files from the APK file. Huang et al. [71] classified the
(2) Secondly, different from malware detection approaches on benign data and malware data using the permission infor-
other system (e.g., Windows/Linux), our approach abstracts mation in manifest and files structure as features. Similarly,
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
1576 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 16, 2021
Aung and Zaw [72] also considered the permission. Dif- mobile side is still rare and on demand. Different from the
ferently, they concentrate on the permission requests in the existing techniques, MobiTive concentrates on using deep
source code, not only the static information. Chin et al. [57] learning algorithms on malware detection according to var-
proposed ComDroid, which detects malware by analyzing the ious performance-based experiments on the Android mobile
manifest file. There are also techniques which are based on devices.
the API [58]. Deshotels et al. [59] classified malware based on Recently, Guo et al. [49] have conducted the evaluation on
the API call frequency. Zhang et al. [60] developed DroidSIFT the performance and robustness of models during training and
based on the API dependency graphs. Zhongyang et al. [61] inference phases, which revealed the potential compatibility
introduced DroidAlarm, which analyzes the inter-procedural issues on different platforms and frameworks. Thus, it is
call graphs constructed by the relationship between permis- important to guarantee the quality of the malware detection
sions and the interface to identify attacks. Yan and Yin [7] system when it is deployed on mobile devices. A lot of deep
proposed DroidScope, which generates semantic information learning techniques [81]–[87] have been proposed for testing
from API call and Dalvik opcode traces. Wu et al. [62] the deep learning frameworks. We leave the quality assurance
proposed the DroidMat to detect malware with API traces, and robustness analysis of our framework as the future work.
intent, communication and some other life-cycle information.
Another line of malware research is conducted based on VII. C ONCLUSION
the program analysis (e.g., control flow graph), which is more This paper presents MobiTive, a performance-sensitive
expensive than the XML-based and API-based approach. How- Android malware detection system on mobile devices as a pre-
ever, the result tends to be more precise. Narayanan et al. [32] installed solution. According to the effectiveness of selected
presented an online SVM classifier, which uses the con- features and the efficiency of feature extraction, MobiTive can
trol flow graph generated from the source code as input. provide a reliable detection accuracy and fast responsive (i.e.,
Enck et al. [66] proposed TaintDroid, which is a taint analysis less than 3 seconds on average) detection service on mobile
tool for Android apps. It detects the leakages with the data flow devices directly. To validate the efficiency and reliability,
analysis on target sensitive data. Meng et al. [63] proposed we evaluate MobiTive on six real mobile devices. To provide
a deterministic symbolic automaton (DSA) based detection more insights of this work, we also make an in-depth analysis
system, in which DSA contains the corresponding components of the performance trend on over one hundred mobile phones.
of the target app. R EFERENCES
Machine learning has achieved great success in malware
[1] S. Chen et al., “An empirical assessment of security risks of global
detection, there exist also a lot of learning-based approaches. Android banking apps,” in Proc. ACM/IEEE 42nd Int. Conf. Softw. Eng.,
Arp et al. [11] proposed Drebin, which is a classifier using Jun. 2020, pp. 1310–1322.
features from both of XML files and API calls. Yuan et al. [20] [2] S. Chen et al., “Are mobile banking apps secure? What can be
improved?” in Proc. 26th ACM Joint Meeting Eur. Softw. Eng. Conf.
et al. provided Droid-detector, which performs on a deep Symp. Found. Softw. Eng. (ESEC/FSE), 2018, pp. 797–802.
belief network. Yu et al. [18] et al. presented a malware [3] Y. Zhou and X. Jiang, “Dissecting Android malware: Characteriza-
detection system, which uses permission and API call traces tion and evolution,” in Proc. IEEE Symp. Secur. Privacy, May 2012,
as input. McLaughlin et al. [33] et al. used the convolution pp. 95–109.
[4] C. Tang et al., “A large-scale empirical study on industrial fake apps,” in
neural network in detection. The raw opcode sequences of Proc. IEEE/ACM 41st Int. Conf. Softw. Eng., Softw. Eng. Pract. (ICSE-
target apps are used as the input feature. Kim et al. [64] SEIP), May 2019, pp. 183–192.
presented a malware detection framework based on multiple [5] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, “Hey, you, get off of my
market: Detecting malicious apps in official and alternative Android
neural networks. Every network has a single feature input and markets,” in Proc. NDSS, 2012, pp. 50–52.
output score. The final detection result is a combination of all [6] W. Zhou, Y. Zhou, M. Grace, X. Jiang, and S. Zou, “Fast, scalable
the models. Xu et al. [65] proposed DeepRefiner, which is an detection of ‘Piggybacked’ mobile applications,” in Proc. 3rd ACM Conf.
efficient two layer malware detection system. Data Appl. Secur. Privacy (CODASPY), 2013, pp. 185–196.
[7] L. K. Yan and H. Yin, “Droidscope: Seamlessly reconstructing the OS
In addition, there are still some other techniques. and dalvik semantic views for dynamic Android malware analysis,” in
Demontis et al. [73] proposed an algorithm to mitigates Proc. USENIX Secur., 2012, pp. 569–584.
attacks like malware data manipulation. Bläsing et al. [74] [8] K. Tam, S. J. Khan, A. Fattori, and L. Cavallaro, “CopperDroid:
introduced AASandbox, which performs detection with Automatic reconstruction of Android malware behaviors,” in Proc. Netw.
Distrib. Syst. Secur. Symp., 2015, pp. 1–15.
combination information of both static and dynamic analy- [9] S. Arzt et al., “Flowdroid: Precise context, flow, field, object-sensitive
sis. Shabtai et al. [68] and Schmidt et al. [69] provided and lifecycle-aware taint analysis for Android apps,” in Proc. PLDI,
the abnormalities identification systems, which use run-time 2014, pp. 259–269.
[10] L. Li et al., “IccTA: Detecting inter-component privacy leaks in Android
device information, such as CPU usage etc. Sun et al. [75] apps,” in Proc. IEEE/ACM 37th IEEE Int. Conf. Softw. Eng., May 2015,
trained a machine learning based classifier, which use the pp. 280–291.
distance of keywords to detect the malware. Lu et al. [76], [11] D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck,
Chan et al. [77], Lu et al. [78] and Wei et al. [79] focused on “Drebin: Effective and explainable detection of Android malware in your
pocket,” in Proc. Netw. Distrib. Syst. Secur. Symp., 2014, pp. 23–26.
detecting vulnerable components, which may hijack the apps. [12] C. Yang, Z. Xu, G. Gu, V. Yegneswaran, and P. Porras, “Droidminer:
Hao et al. [80] provided a malware detection system, Droid- Automated mining and characterization of fine-grained malicious behav-
Modss, which uses hash comparison to detect repacked Apks. iors in Android applications,” in Proc. ESORICS, 2014, pp. 163–182.
[13] S. Chen, M. Xue, Z. Tang, L. Xu, and H. Zhu, “StormDroid:
Grace et al. [70] proposed RiskRanker, which performs detec- A streaminglized machine learning-based system for detecting Android
tion via analyzing specific app behaviors. malware,” in Proc. 11th ACM Asia Conf. Comput. Commun. Secur. (ASIA
Existing techniques mainly focused on detecting mal- CCS), 2016.
ware with the information from APK or the source code [14] E. Mariconti, L. Onwuzurike, P. Andriotis, E. De Cristofaro, G. Ross,
and G. Stringhini, “MaMaDroid: Detecting Android malware by building
on server. However, with the rapid development of AI Markov chains of behavioral models,” in Proc. Netw. Distrib. Syst. Secur.
chips on devices, the research about malware detection on Symp., 2017, pp. 1–34.
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
FENG et al.: PERFORMANCE-SENSITIVE MALWARE DETECTION SYSTEM USING DL ON MOBILE DEVICES 1577
[15] S. Chen, M. Xue, and L. Xu, “Towards adversarial detection of mobile [48] A. Narayanan, C. Soh, L. Chen, Y. Liu, and L. Wang, “apk2vec: Semi-
malware: Poster,” in Proc. 22nd Annu. Int. Conf. Mobile Comput. Netw., supervised multi-view representation learning for profiling Android
Oct. 2016, pp. 415–416. applications,” in Proc. IEEE Int. Conf. Data Mining (ICDM), Nov. 2018,
[16] L. Fan, M. Xue, S. Chen, L. Xu, and H. Zhu, “POSTER: Accuracy pp. 357–366.
vs. Time cost: Detecting Android malware through Pareto ensemble [49] Q. Guo et al., “An empirical study towards characterizing deep learning
pruning,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur., development and deployment across different frameworks and plat-
Oct. 2016, pp. 1748–1750. forms,” in Proc. 34th IEEE/ACM Int. Conf. Automated Softw. Eng.
[17] S. Chen et al., “Automated poisoning attacks and defenses in malware (ASE), Nov. 2019, pp. 810–822.
detection systems: An adversarial machine learning approach,” Comput. [50] Inspeckage. Accessed: Apr. 2020. [Online]. Available:
Secur., vol. 73, pp. 326–344, Mar. 2018. https://github.com/ac-pm/Inspeckage
[18] W. Yu, L. Ge, G. Xu, and X. Fu, “Towards neural network based malware [51] Android-Profiler. Accessed: Apr. 2020. [Online]. Available:
detection on Android mobile devices,” in Cybersecurity Systems for https://developer.Android.com
Human Cognition Augmentation. Cham, Switzerland: Springer, 2014, /studio/profile/Android-profiler
doi: 10.1007/978-3-319-10374-7_7. [52] N. Papernot, P. McDaniel, X. Wu, S. Jha, and A. Swami, “Distillation
[19] XDA. (2020). XDA-Developers Android Forums. Accessed: Apr. 2020. as a defense to adversarial perturbations against deep neural networks,”
[Online]. Available: https://forum.xda-developers.com in Proc. IEEE Symp. Secur. Privacy (SP), May 2016, pp. 582–597.
[20] Z. Yuan, Y. Lu, and Y. Xue, “Droiddetector: Android malware charac- [53] N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and
terization and detection using deep learning,” Tsinghua Sci. Technol., A. Swami, “The limitations of deep learning in adversarial settings,”
vol. 21, no. 1, pp. 114–123, 2016. in Proc. IEEE Eur. Symp. Secur. Privacy (EuroS&P), Mar. 2016,
[21] B. Wu et al., “Why an Android app is classified as malware? pp. 372–387.
Towards malware classification interpretation,” 2020, arXiv:2004.11516. [54] S. Chen, M. Xue, L. Fan, L. Ma, Y. Liu, and L. Xu, “How can we craft
[Online]. Available: https://arxiv.org/abs/2004.11516 large-scale Android malware? An automated poisoning attack,” in Proc.
[22] R. Feng, J. Q. Lim, S. Chen, S.-W. Lin, and Y. Liu, “Seqmobile: IEEE 1st Int. Workshop Artif. Intell. Mobile (AI4Mobile), Feb. 2019,
An efficient sequence-based malware detection system using RNN on pp. 21–24.
mobile devices,” in Proc. ICECCS, 2020. [55] G. Chen et al., “Who is real bob? adversarial attacks on speaker
[23] R. Feng et al., “MobiDroid: A performance-sensitive malware detection recognition systems,” Proc. S&P, 2021, pp. 1–18.
system on mobile platform,” in Proc. 24th Int. Conf. Eng. Complex [56] X. Chen et al., “Android HIV: A study of repackaging malware for
Comput. Syst. (ICECCS), Nov. 2019, pp. 61–70. evading machine-learning detection,” IEEE Trans. Inf. Forensics Secu-
[24] Tensorflow Lite. Accessed: Apr. 2020. [Online]. Available: https://www. rity, vol. 15, pp. 987–1001, Jul. 2019.
tensorflow.org/lite/ [57] E. Chin, A. P. Felt, K. Greenwood, and D. Wagner, “Analyzing inter-
[25] Symantec Security. Accessed: Apr. 2020. [Online]. Available: application communication in Android,” in Proc. 9th Int. Conf. Mobile
https://www.symantec.com/security-center/threats/ Syst., Appl., Services (MobiSys), 2011, pp. 239–252.
[26] Overview of MobiTive. Accessed: Apr. 2020. [Online]. Available: [58] L. Li, J. Gao, T. F. Bissyandé, L. Ma, X. Xia, and J. Klein, “Character-
https://sites.google.com/view/mobitive2020 ising deprecated Android APIs,” in Proc. 15th Int. Conf. Mining Softw.
[27] Apkmirror Market. Accessed: Apr. 2020. [Online]. Available: https:// Repositories (MSR), 2018, pp. 254–264.
www.apkmirror.com/ [59] L. Deshotels, V. Notani, and A. Lakhotia, “DroidLegacy: Automated
[28] Core ML. Accessed: Apr. 2020. [Online]. Available: https:// familial classification of Android malware,” in Proc. ACM SIGPLAN
developer.apple.com/documentation/coreml/ Program Protection Reverse Eng. Workshop (PPREW), 2014, pp. 1–12.
[29] Caffe2 Mobile. Accessed: Apr. 2020. [Online]. Available: https://caffe2. [60] M. Zhang, Y. Duan, H. Yin, and Z. Zhao, “Semantics-aware Android
ai/docs/mobile-integration.html malware classification using weighted contextual API dependency
[30] Pytorch Mobile. Accessed: Apr. 2020. [Online]. Available: https:// graphs,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. (CCS),
pytorch.org/mobile/Android/ 2014, pp. 1105–1116.
[31] Post-Training Quantization. Accessed: Apr. 2020. [Online]. Available: [61] Y. Zhongyang, Z. Xin, B. Mao, and L. Xie, “DroidAlarm: An all-sided
https://www.tensorflow.org/lite/performance/post_training_quantization/ static analysis tool for Android privilege-escalation malware,” in Proc.
[32] A. Narayanan, L. Yang, L. Chen, and L. Jinliang, “Adaptive and scalable 8th ACM SIGSAC Symp. Inf., Comput. Commun. Secur. (ASIA CCS),
Android malware detection through online learning,” in Proc. Int. Joint 2013, pp. 353–358.
Conf. Neural Netw. (IJCNN), Jul. 2016, pp. 2484–2491. [62] D.-J. Wu, C.-H. Mao, T.-E. Wei, H.-M. Lee, and K.-P. Wu, “DroidMat:
[33] N. McLaughlin et al., “Deep Android malware detection,” in Proc. Android malware detection through manifest and API calls tracing,” in
CODASPY, 2017, pp. 301–308. Proc. 7th Asia Joint Conf. Inf. Secur., Aug. 2012, pp. 62–69.
[34] Axmldec. Accessed: Apr. 2020. [Online]. Available: https://github. [63] G. Meng, Y. Xue, Z. Xu, Y. Liu, J. Zhang, and A. Narayanan, “Semantic
com/ytsutano/axmldec modelling of Android malware for effective malware comprehension,
[35] Axml. Accessed: Apr. 2020. [Online]. Available: https://github.com/
detection, and classification,” in Proc. 25th Int. Symp. Softw. Test. Anal.
xgouchet/AXML
[36] Dex2jar. Accessed: Apr. 2020. [Online]. Available: https://github.com/ (ISSTA), 2016, pp. 306–317.
[64] T. Kim, B. Kang, M. Rho, S. Sezer, and E. G. Im, “A multi-
pxb1988/dex2jar
[37] Apktool. A Tool for Reverse Engineering Android APK Files. modal deep learning method for Android malware detection using
Accessed: Apr. 2020. [Online]. Available: https://ibotpeaches.github. various features,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 3,
io/Apktool/ pp. 773–788, Aug. 2018.
[38] Androguard. Accessed: Apr. 2020. [Online]. Available: https://github. [65] K. Xu, Y. Li, R. H. Deng, and K. Chen, “DeepRefiner: Multi-layer
com/androguard/ Android malware detection system applying deep neural networks,”
[39] Soot. Accessed: Apr. 2020. [Online]. Available: https://github.com/ in Proc. IEEE Eur. Symp. Secur. Privacy (EuroS&P), Apr. 2018,
Sable/soot/ pp. 473–487.
[40] Keras: Neural Networks API. Accessed: Apr. 2020. [Online]. Available: [66] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. G. Chun, L. P. Cox,
https://keras.io/ J. Jung, P. McDaniel, and A. N. Sheth, “Taintdroid: An information-
[41] Scikit-Learn. Accessed: Apr. 2020. [Online]. Available: https://scikit- flow tracking system for realtime privacy monitoring on smartphones,”
learn.org/stable/ ACM Trans. Comput. Syst., vol. 32, no. 2, pp. 1–29, 2014.
[42] Tensorflow. Accessed: Apr. 2020. [Online]. Available: https://www. [67] K. Basu, P. Krishnamurthy, F. Khorrami, and R. Karri, “A theoretical
tensorflow.org/ study of hardware performance counters-based malware detection,”
[43] Daivik Opcode. Accessed: Apr. 2020. [Online]. Available: http:// IEEE Trans. Inf. Forensics Security, vol. 15, pp. 512–525, Jun. 2019.
pallergabor.uw.hu/Androidblog/dalvik_opcodes.html [68] A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, “‘Andro-
[44] Virustotal. Accessed: Apr. 2020. [Online]. Available: https://www. maly’: A behavioral malware detection framework for Android devices,”
virustotal.com/ J. Intell. Inf. Syst., vol. 38, no. 1, pp. 161–190, 2012.
[45] Contagio Website. Accessed: Apr. 2020. [Online]. Available: http:// [69] A.-D. Schmidt, F. Peters, F. Lamour, C. Scheel, S. A. Çamtepe, and
contagiominidump.blogspot.com/ Ş. Albayrak, “Monitoring smartphones for anomaly detection,” Mobile
[46] Pwnzen Infotech. Accessed: Apr. 2020. [Online]. Available: Netw. Appl., vol. 14, no. 1, pp. 92–106, Feb. 2009.
http://www.pwnzen.com/ [70] M. Grace, Y. Zhou, Q. Zhang, S. Zou, and X. Jiang, “RiskRanker:
[47] E. B. Karbab, M. Debbabi, A. Derhab, and D. Mouheb, “MalDozer: Scalable and accurate zero-day Android malware detection,” in
Automatic framework for Android malware detection using deep learn- Proc. 10th Int. Conf. Mobile Syst., Appl., Services (MobiSys), 2012,
ing,” Digit. Invest., vol. 24, pp. S48–S59, Mar. 2018. pp. 281–294.
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.
1578 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 16, 2021
[71] C.-Y. Huang, Y.-T. Tsai, and C.-H. Hsu, “Performance evaluation on Sen Chen (Member, IEEE) received the Ph.D.
permission-based detection for Android malware,” in Proc. Adv. Intell. degree in computer science from the School of
Syst. Appl., vol. 2, 2013, pp. 111–120. Computer Science and Software Engineering, East
[72] Z. Aung and W. Zaw, “Permission-based Android malware detection,” China Normal University, China, in June 2019.
Int. J. Sci. Technol. Res., vol. 2, no. 3, pp. 228–234, 2013. He was a Research Assistant with Nanyang
[73] A. Demontis et al., “Yes, machine learning can be more secure! Technological University (NTU), Singapore, from
A case study on Android malware detection,” IEEE Trans. Depend. Sec. 2016 to 2019, and a Research Fellow from 2019 to
Comput., vol. 16, no. 4, pp. 711–724, Aug. 2019. 2020. He is currently a Research Assistant Professor
[74] T. Bläsing, L. Batyuk, A.-D. Schmidt, S. A. Camtepe, and S. Albayrak, with the School of Computer Science and Engineer-
“An Android application sandbox system for suspicious software detec- ing, NTU. His research interests include security and
tion,” in Proc. 5th Int. Conf. Malicious Unwanted Softw., Oct. 2010, software engineering.
pp. 55–62.
[75] J. Sun, K. Yan, X. Liu, C. Yang, and Y. Fu, “Malware detec-
tion on Android smartphones using keywords vector and SVM,” in
Proc. IEEE/ACIS 16th Int. Conf. Comput. Inf. Sci. (ICIS), May 2017,
pp. 833–838.
[76] L. Lu, Z. Li, Z. Wu, W. Lee, and G. Jiang, “CHEX: Statically vetting
Android apps for component hijacking vulnerabilities,” in Proc. ACM Xiaofei Xie received the B.E., M.E., and Ph.D.
Conf. Comput. Commun. Secur. (CCS), 2012, pp. 229–240. degrees from Tianjin University. He is currently
[77] P. P. F. Chan, L. C. K. Hui, and S. M. Yiu, “DroidChecker: Analyzing a Presidential Post-Doctoral Fellow with Nanyang
Android applications for capability leak,” in Proc. 5th ACM Conf. Secur. Technological University, Singapore. He has pub-
Privacy Wireless Mobile Netw. (WISEC), 2012, pp. 125–136. lished some top tier conference/journal papers rel-
[78] K. Lu et al., “Checking more and alerting less: Detecting privacy evant to software analysis in ISSTA, FSE, TSE,
leakages via enhanced data-flow analysis and peer voting,” in Proc. Netw. IJCAI, and CCS. His main research interests include
Distrib. Syst. Secur. Symp., 2015, pp. 1–15. program analysis, loop analysis, traditional software
[79] F. Wei, S. Roy, X. Ou, and Robby, “AmAndroid: A precise and general testing, and security analysis of artificial intelli-
inter-component data flow analysis framework for security vetting of gence. In particular, he won two ACM SIGSOFT
Android apps,” in Proc. ACM SIGSAC Conf. Comput. Commun. Secur. Distinguished Paper awards.
(CCS), 2014, pp. 1329–1341.
[80] S. Hao, B. Liu, S. Nath, W. G. J. Halfond, and R. Govindan, “PUMA:
Programmable UI-automation for large-scale dynamic analysis of mobile
apps,” in Proc. 12th Annu. Int. Conf. Mobile Syst., Appl., Services
(MobiSys), 2014, pp. 204–217.
[81] K. Pei, Y. Cao, J. Yang, and S. Jana, “DeepXplore: Automated whitebox Guozhu Meng received the B.E. and M.E. degrees
testing of deep learning systems,” in Proc. 26th Symp. Operating Syst. from Tianjin University, China, in 2009 and 2012,
Princ., Oct. 2017, pp. 1–18. respectively, and the Ph.D. degree from Nanyang
[82] L. Ma et al., “DeepGauge: Multi-granularity testing criteria for deep Technological University, Singapore, in 2017.
learning systems,” in Proc. 33rd ACM/IEEE Int. Conf. Automated Softw. He was a Research Fellow with Nanyang Tech-
Eng. (ASE), 2018, pp. 120–131. nological University and a Visiting Research Fellow
[83] X. Xie et al., “DeepHunter: A coverage-guided fuzz testing framework with the University of Luxembourg. He is currently
for deep neural networks,” in Proc. 28th ACM SIGSOFT Int. Symp. an Associate Professor with the Institute of Infor-
Softw. Test. Anal. (ISSTA), 2019, pp. 146–157. mation Engineering, Chinese Academy of Sciences.
[84] X. Du, X. Xie, Y. Li, L. Ma, Y. Liu, and J. Zhao, “DeepStellar: Model-
His research interests include mobile security, vul-
based quantitative analysis of stateful deep learning systems,” in Proc.
nerability detection, and big data analysis.
27th ACM Joint Meeting Eur. Softw. Eng. Conf. Symp. Found. Softw.
Eng. (ESEC/FSE), 2019, pp. 477–487.
[85] L. Ma et al., “DeepMutation: Mutation testing of deep learning systems,”
in Proc. IEEE 29th Int. Symp. Softw. Rel. Eng. (ISSRE), Oct. 2018,
pp. 100–111.
[86] X. Zhang et al., “Towards characterizing adversarial defects of deep
learning software from the lens of uncertainty,” in Proc. ACM/IEEE Shang-Wei Lin received the B.S. degree from
42nd Int. Conf. Softw. Eng., Jun. 2020, pp. 1–13. National Chung Cheng University in 2003 and the
[87] X. Xie, L. Ma, H. Wang, Y. Li, Y. Liu, and X. Li, “DiffChaser: Detecting Ph.D. degree in 2010.
disagreements for deep neural networks,” in Proc. 28th Int. Joint Conf. He started his Post-Doctoral Researcher work with
Artif. Intell., Aug. 2019, pp. 5772–5778. NUS and SUTD from 2011 to 2015. In May 2015,
he joined Nanyang Technological University (NTU)
as an Assistant Professor. His research interests
include formal verification, formal synthesis, embed-
ded system design, cyberphysical systems, security
systems, multi-core programming, and component-
based object-oriented app frameworks for real-time
embedded systems.
Authorized licensed use limited to: Northeastern University. Downloaded on January 18,2021 at 13:38:12 UTC from IEEE Xplore. Restrictions apply.