codes that could be recurrent in malicious malware’s
code. This latter technique could also help to under-
stand which is the family each malware instance be-
longs to, which is a further improvement of interest in
the area of malware detection.
An undeniable advantage of this technique is the
easiness of implementation and the correspondent
lightness in terms of requested resources: basically
the proposed method needs to extract the occurrence
frequency of a set of op-codes. The method can be
straightforward reproduced and this fosters the repli-
cations of our study for confirming the outcomes or
finding possible weakness points.
We can compare our work with (Arp et al., 2014)
and (Peng et al., 2012), as these are the closest works
to ours for technique among the considered related
works. Arp et al. (Arp et al., 2014) obtained a pre-
cision (94%) which is almost identical than the one
obtained with our approach (93.9%), while Peng et
al. (Peng et al., 2012) reported a ROC AREA of 95%,
which coincides with our best ROC AREA (95.6%.)
The best deployment of the proposed classifier is a
client-server architecture, where the classifier resides
in a server and a client app is installed on the user de-
vice and requires the analysis of a certain app to the
server.
The main limitation of the evaluation stands in
the external validity, as we have considered a sam-
ple of applications collected in 2012. Running our
method on newest samples could produce different re-
sults. However, some mitigation factors must be taken
into account for this experimental threat. First, we
have considered a large set of samples, amounting to
11,200 units. This could assure a wide coverage of
many kinds of malware and trusted applications, so
the sample could be considered well representative of
the original population. Additionally, in order to en-
force the validity of the used dataset, we should con-
sider that malware traditionally evolves by improving
existing malware with (a few) new functions, or merg-
ing fragments of existing malware applications.
REFERENCES
Androguard (2014). https://code.google.com/p/androguard/
apktool (2014). https://code.google.com/p/android-apktool/
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., and
Rieck, K. (2014). Drebin: Effective and explain-
able detection of android malware in your pocket. In
NDSS’14, Network and Distributed System Security
Symposium. IEEE.
Attaluri, S., McGhee, S., and Stamp, M. (2008). Profile
hidden markov models and metamorphic virus detec-
tion. Journal of Computer Virology and Hacking Tech-
niques, 5(2):179–192.
Baysa, D., Low, R. M., and Stamp, M. (2013). Structural
entropy and metamorphic malware. Journal of Com-
puter Virology and Hacking Techniques, 9(4):179–
192.
Bilar, D. (2007). Opcodes as predictor for malware. In-
ternational Journal of Electronic Security and Digital
Forensics, Vol. 1, No. 2, pp. 156-168.
Canfora, G., Mercaldo, F., and Visaggio, C. (2013).
A classifier of malicious android applications. In
IWSMA’13, 2nd International Workshop on Security
of Mobile Applications, in conjunction with the In-
ternational Conference on Availability, Reliability and
Security, pp. 607-614. IEEE.
Chakradeo, S., Reaves, B., Traynor, P., and Enck, W.
(2013). Mast: Triage for market-scale mobile mal-
ware analysis. In WISEC’13, 6th ACM Conference on
Security in Wireless and Mobile Networks, pp 13-24.
ACM.
Chandra, D. and Franz, M. (2007). Fine-grained informa-
tion flow analysis and enforcement in a java virtual
machine. In ACSAC’07, 23th Annual Computer Secu-
rity Applications Conference, pp 463-475. IEEE.
Choucane, M. and Lakhotia, A. (2006). Using engine sig-
nature to detect metamorphic malware. In WORM’06,
4th ACM workshop on Recurring malcode, pp.73-78.
ACM.
dalvik (2014). http://pallergabor.uw.hu/androidblog/dalvik
opcodes.html
Desnos, A. (2012). Android: Static analysis using similar-
ity distance. In HICSS’12, 45th Hawaii International
Conference on System Sciences, pp.5394-5403. IEEE.
Enck, W., Gilbert, P., Chun, B., Con, L., Jung, J., McDaniel,
P., and Sheth, A. (2010). Taintdroid: An information-
flow tracking system for realtime privacy monitoring
on smartphones. In OSDI’10, 9th USENIX Symposium
on Operating Systems Design and Implementation.
Fedler, R., Sch
¨
utte, J., and Kulicke, M. (2014). On
the effectiveness of malware protection on an-
droid: An evaluation of android antivirus apps,
http://www.aisec.fraunhofer.de/
Gartner (2014). http://www.gartner.com/newsroom/id/2944819
Gibler, C., Crussell, J., Erickson, J., and Chen, H. (2012).
AndroidLeaks: Automatically Detecting Potential Pri-
vacy Leaks in Android Applications on a Large Scale.
Trust and Trustworthy Computing Lecture Notes in
Computer Science.
GoogleMobile (2014). http://googlemobile.blogspot.it/2012/
02/android-and-security.html
GooglePlay (2014). https://play.google.com/
Marforio, C., Aurelien, F., and Srdjan, C. (2011).
Application collusion attack on the permission-
based security model and its implications for mod-
ern smartphone systems, ftp://ftp.inf.ethz.ch/doc/tech-
reports/7xx/724.pdf
Oberheide, J. and Miller, C. (2012). Dissect-
ing the android bouncer. In SummerCon,
https://jon.oberheide.org/files/summercon12-
bouncer.pdf
MobileMalwareDetectionusingOp-codeFrequencyHistograms
37