system calls generated by the execution of malicious
behavior.
4 CONCLUSION AND FUTURE
WORK
Every day we store a lot of sensitive and private infor-
mation on our mobile devices. This is the reason why
the interest of attackers with regard to our smartphone
and tables is day-by-day increasing, with the develop-
ment of more and more aggressive malicious payload
devoted to exfiltrate our sensitive data. From these
considerations, a method aimed to detect mobile mal-
ware is proposed in this paper. We focus on the most
widespread mobile platform i.e., Android, by design-
ing a method aimed to perform a dynamic analysis
by extracting the system call trace of an application
under analysis.
We exploit a CNN designed by authors to analyse
images directly obtained from the system call trace to
discern malicious applications from legitimate ones
by obtaining an accuracy equal to 0.781. Moreover,
we resort to the Grad-CAM to highlight into the im-
age representing the application system call trace the
areas symptomatic of a certain prediction, thus pro-
viding explainability behind the model prediction.
As future work, we plan to consider more al-
gorithms to provide explainability for instance, the
Grad-CAM++ (Chattopadhay et al., 2018) and the
Score-CAM (Wang et al., 2020), to compare visual
explanations. Also other deep learning models will be
considered, for instance, the VGG19 and the ResNet
ones with the aim to increase malware detection ac-
curacy. Moreover, considering that the proposed
method is platform-independent, we will also con-
sider a dataset of PC ransomware and legitimate ap-
plications .
ACKNOWLEDGEMENTS
This work has been partially supported by EU DUCA,
EU CyberSecPro, and EU E-CORRIDOR projects
and PNRR SERICS SPOKE1 DISE, RdS 2022-2024
cybersecurity.
REFERENCES
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H.,
Rieck, K., and Siemens, C. (2014). Drebin: Effec-
tive and explainable detection of android malware in
your pocket. In Ndss, volume 14, pages 23–26.
Canfora, G., Medvet, E., Mercaldo, F., and Visaggio, C. A.
(2015). Detecting android malware using sequences
of system calls. In Proceedings of the 3rd Interna-
tional Workshop on Software Development Lifecycle
for Mobile, pages 13–20.
Casolare, R., De Dominicis, C., Iadarola, G., Martinelli, F.,
Mercaldo, F., and Santone, A. (2021). Dynamic mo-
bile malware detection through system call-based im-
age representation. J. Wirel. Mob. Networks Ubiqui-
tous Comput. Dependable Appl., 12(1):44–63.
Casolare, R., Martinelli, F., Mercaldo, F., and Santone,
A. (2020). Detecting colluding inter-app commu-
nication in mobile environment. Applied Sciences,
10(23):8351.
Chattopadhay, A., Sarkar, A., Howlader, P., and Balasub-
ramanian, V. N. (2018). Grad-cam++: Generalized
gradient-based visual explanations for deep convolu-
tional networks. In 2018 IEEE winter conference on
applications of computer vision (WACV), pages 839–
847. IEEE.
Jerbi, M., Dagdia, Z. C., Bechikh, S., and Said, L. B.
(2020). On the use of artificial malicious patterns for
android malware detection. Computers & Security,
92:101743.
Jiang, X. and Zhou, Y. (2013). Android Malware. Springer
Publishing Company, Incorporated.
Medvet, E. and Mercaldo, F. (2016). Exploring the usage
of topic modeling for android malware static analysis.
In 2016 11th International Conference on Availabil-
ity, Reliability and Security (ARES), pages 609–617.
IEEE.
Mercaldo, F., Nardone, V., Santone, A., and Visaggio, C. A.
(2016). Download malware? no, thanks: how formal
methods can block update attacks. In Proceedings of
the 4th FME Workshop on Formal Methods in Soft-
ware Engineering, FormaliSE@ICSE 2016, Austin,
Texas, USA, May 15, 2016, pages 22–28. ACM.
Mercaldo, F. and Santone, A. (2021). Formal equivalence
checking for mobile malware detection and family
classification. IEEE Transactions on Software Engi-
neering.
Michael, S., Florian, E., Thomas, S., Felix, C. F., and Hoff-
mann, J. (2013). Mobilesandbox: Looking deeper into
android applications. In Proceedings of the 28th In-
ternational ACM Symposium on Applied Computing
(SAC).
Selvaraju, R. R., Cogswell, M., Das, A., Vedantam, R.,
Parikh, D., and Batra, D. (2017). Grad-cam: Visual
explanations from deep networks via gradient-based
localization. In Proceedings of the IEEE international
conference on computer vision, pages 618–626.
Wang, H., Wang, Z., Du, M., Yang, F., Zhang, Z., Ding, S.,
Mardziel, P., and Hu, X. (2020). Score-cam: Score-
weighted visual explanations for convolutional neu-
ral networks. In Proceedings of the IEEE/CVF con-
ference on computer vision and pattern recognition
workshops, pages 24–25.
Zhou, Y. and Jiang, X. (2012). Dissecting android mal-
ware: Characterization and evolution. In Proceed-
ings of 33rd IEEE Symposium on Security and Privacy
(Oakland 2012).
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
312