makes the networks very sensitive to slight modifi-
cations of the binary. It requires a fixed length in-
put, so any shift of the binary bytes (like adding bloa-
ting code) breaks the detection. Deep neural networks
that learn to detect malware based on static analy-
sis would be subject to the same limitations as tradi-
tional signature-based approaches. Malware authors
have shown a considerable talent for avoiding signa-
ture detection systems. Adversarial neural networks
have been very successful in fooling neural network
based recognition systems (Nguyen et al., 2015).
As such,it would be preferable to have deep neural
networks running on the cloud and analyzing applica-
tion behavior for applications available on the mar-
ketplaces, instead of running on endpoint devices for
real-time detection. Potentially, unsupervised appro-
aches to deep learning could be used to generate re-
presentations. These signatures could then be used
by pattern-mathcing based detection systems on end-
point devices. There is a lot more scope for work in
this field. The study presented here considers only
static analysis or raw byte analysis. However the re-
sults do show promise and potential for application to
dynamic analysis methods.
REFERENCES
Allix, K., Bissyand
´
e, T. F., Klein, J., and Le Traon, Y.
(2016). Androzoo: Collecting millions of android
apps for the research community. In Mining Software
Repositories (MSR), 2016 IEEE/ACM 13th Working
Conference on, pages 468–471. IEEE.
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H.,
Rieck, K., and Siemens, C. (2014). Drebin: Effective
and explainable detection of android malware in your
pocket. In Ndss, volume 14, pages 23–26.
Deloitte (2017). Global mobile consumer survey. Technical
report.
Dozat, T. (2016). Incorporating nesterov momentum into
adam.
Feng, Y., Anand, S., Dillig, I., and Aiken, A. (2014). Ap-
poscopy: Semantics-based detection of android mal-
ware through static analysis. In Proceedings of the
22nd ACM SIGSOFT International Symposium on
Foundations of Software Engineering, pages 576–587.
ACM.
Gers, F. A., Schmidhuber, J., and Cummins, F. (1999). Le-
arning to forget: Continual prediction with lstm.
Gultnieks, C. (2010). F-droid. https://f-droid.org/en/.
Accessed: 2018-10-20.
Irolla, P. and Dey, A. (2018). The duplication issue within
the drebin dataset. Journal of Computer Virology and
Hacking Techniques, pages 1–5.
Jiang, X. and Zhou, Y. (2012). Dissecting android malware:
Characterization and evolution. In 2012 IEEE Sympo-
sium on Security and Privacy, pages 95–109. IEEE.
Kalchbrenner, N., Grefenstette, E., and Blunsom, P. (2014).
A convolutional neural network for modelling senten-
ces. arXiv preprint arXiv:1404.2188.
Kingma, D. P. and Ba, J. (2014). Adam: A method for sto-
chastic optimization. arXiv preprint arXiv:1412.6980.
Krizhevsky, A., Sutskever, I., and Hinton, G. E. (2012).
Imagenet classification with deep convolutional neu-
ral networks. In Advances in neural information pro-
cessing systems, pages 1097–1105.
Le, Q. and Mikolov, T. (2014). Distributed representations
of sentences and documents. In International Confe-
rence on Machine Learning, pages 1188–1196.
McCulloch, W. S. and Pitts, W. (1943). A logical calculus
of the ideas immanent in nervous activity. The bulletin
of mathematical biophysics, 5(4):115–133.
Nguyen, A., Yosinski, J., and Clune, J. (2015). Deep neural
networks are easily fooled: High confidence predicti-
ons for unrecognizable images. In Proceedings of the
IEEE Conference on Computer Vision and Pattern Re-
cognition, pages 427–436.
Raff, E., Barker, J., Sylvester, J., Brandon, R., Catanzaro,
B., and Nicholas, C. (2017). Malware detection by
eating a whole exe. arXiv preprint arXiv:1710.09435.
Schmidhuber, J. (2015). Deep learning in neural networks:
An overview. Neural networks, 61:85–117.
Schmidt, A.-D., Bye, R., Schmidt, H.-G., Clausen, J., Kiraz,
O., Yuksel, K. A., Camtepe, S. A., and Albayrak, S.
(2009). Static analysis of executables for collabora-
tive malware detection on android. In Communica-
tions, 2009. ICC’09. IEEE International Conference
on, pages 1–5. IEEE.
SophosLabs (2017). Sophoslabs 2018 malware forecast.
Technical report.
Springenberg, J. T., Dosovitskiy, A., Brox, T., and Riedmil-
ler, M. (2014). Striving for simplicity: The all convo-
lutional net. arXiv preprint arXiv:1412.6806.
Total, V. (2012). Virustotal-free online virus, malware and
url scanner. Online: https://www. virustotal. com/en.
Tumbleson, C. and Wisniewski, R. (2016). Apktool.
Wu, D.-J., Mao, C.-H., Wei, T.-E., Lee, H.-M., and Wu,
K.-P. (2012). Droidmat: Android malware detection
through manifest and api calls tracing. In Information
Security (Asia JCIS), 2012 Seventh Asia Joint Confe-
rence on, pages 62–69. IEEE.
Deep Neural Networks for Android Malware Detection
663