that significantly differs from known malware. We
systematically compared HMMs (a generative prob-
abilistic model) and one-class SVMs with different
kernels (discriminative, non-probabilistic model) in
combination with three different feature types derived
from system call traces. We showed that HMMs in
combination with the sequence feature slightly out-
perform the other modeling approaches. The most
discriminative feature type, however, strongly de-
pends on the model chosen. In particular, despite
of the good performance of the sequence feature in
the HMM case, the binary feature outperformed both
the frequency feature and the sequence feature in the
one-class SVM case. Overall, our evaluation shows
that the discriminatory power of the features derived
from system call traces varies greatly on a per-app
basis which indicates that not all malicious behav-
ior is appropriately covered with system call traces.
We identified the heavy use of inter-process commu-
nication (IPC) on the Android platform as a main rea-
son. In future work we plan to study low-level fea-
tures that provide superior discrimination power than
system calls and to evaluate them with state-of-the art
models from the field of one-class classification.
REFERENCES
Aafer, Y., Du, W., and Yin, H. (2013). Droidapiminer: Min-
ing api-level features for robust malware detection in
android. In SecureComm, volume 127 of LNICST,
pages 86–103. Springer.
Aldini, A., Martinelli, F., Saracino, A., and Sgandurra, D.
(2014). Detection of repackaged mobile applications
through a collaborative approach. Concurrency and
Computation: Practice and Experience.
Arp, D., Spreitzenbarth, M., H
¨
ubner, M., Gascon, H.,
Rieck, K., and Siemens, C. (2014). Drebin: Effec-
tive and explainable detection of android malware in
your pocket. In Proceedings of NDSS.
Bose, A., Hu, X., Shin, K. G., and Park, T. (2008). Be-
havioral detection of malware on mobile handsets. In
Proceedings of ACM MobiSys, pages 225–238.
Burguera, I., Zurutuza, U., and Nadjm-Tehrani, S. (2011).
Crowdroid: behavior-based malware detection system
for android. In Proceedings of ACM SPSM.
Dini, G., Martinelli, F., Matteucci, I., Saracino, A., and
Sgandurra, D. (2014). Introducing probabilities in
contract-based approaches for mobile application se-
curity. In Data Privacy Management and Autonomous
Spontaneous Security, pages 284–299. Springer.
Dini, G., Martinelli, F., Saracino, A., and Sgandurra, D.
(2012). Madam: A multi-level anomaly detector for
android malware. In MMM-ACNS, volume 7531 of
LNCS, pages 240–253. Springer.
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., and Stolfo,
S. (2002). A geometric framework for unsupervised
anomaly detection: Detecting intrusions in unlabeled
data. In Applications of Data Mining in Computer
Security, pages 77–101. Springer.
Forrest, S., Hofmeyr, S. A., Somayaji, A., and Longstaff,
T. A. (1996). A sense of self for unix processes. In
Proceedings of IEEE S&P.
Gartner (2014). Gartner says by 2018, more than 50 percent
of users will use a tablet or smartphone first for all
online activities. http://www.gartner.com/newsroom/
id/2939217.
IDC (2014). Worldwide smartphone growth forecast. http://
www.idc.com/getdoc.jsp?containerId=prUS25282214.
Leslie, C. S., Eskin, E., and Noble, W. S. (2002). The spec-
trum kernel: A string kernel for SVM protein clas-
sification. In Proceedings of Pacific Symposium on
Biocomputing, pages 566–575.
Maggi, F., Matteucci, M., and Zanero, S. (2010). Detecting
intrusions through system call sequence and argument
analysis. IEEE TDSC, 7(4):381–395.
Mutz, D., Valeur, F., Vigna, G., and Kruegel, C. (2006).
Anomalous system call detection. ACM TISSEC,
9(1):61–93.
Rabiner, L. R. (1989). A tutorial on hidden Markov models
and selected applications in speech recognition. Pro-
ceedings of the IEEE, 77(2):257–286.
Sch
¨
olkopf, B., Williamson, R. C., Smola, A. J., Shawe-
Taylor, J., and Platt, J. C. (1999). Support vector
method for novelty detection. NIPS, 12:582–588.
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., and Weiss,
Y. (2012). “Andromaly”: a behavioral malware detec-
tion framework for android devices. JIIS, 38(1):161–
190.
Warrender, C., Forrest, S., and Pearlmutter, B. (1999). De-
tecting intrusions using system calls: alternative data
models. In Proceedings of IEEE S&P.
Xie, L., Zhang, X., Seifert, J., and Zhu, S. (2010). pBMDS:
a behavior-based malware detection system for cell-
phone devices. In Proceedings of ACM WiSec.
Yeung, D. and Ding, Y. (2003). Host-based intrusion de-
tection using dynamic and static behavioral models.
Pattern Recognition, 36(1):229–243.
Zhang, M., Duan, Y., Yin, H., and Zhao, Z. (2014).
Semantics-aware android malware classification using
weighted contextual api dependency graphs. In Pro-
ceedings of ACM CCS.
Zhou, Y. and Jiang, X. (2012). Dissecting Android Mal-
ware: Characterization and Evolution. In Proceedings
of IEEE S&P.
ICISSP 2016 - 2nd International Conference on Information Systems Security and Privacy
36