Reference : Android Malware Detection Using BERT
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/52627
Android Malware Detection Using BERT
English
[en] Android Malware Detection Using BERT
Souani, Badr mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Khanfir, Ahmed mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SerVal >]
Bartel, Alexandre mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > >]
Allix, Kevin mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > TruX >]
Le Traon, Yves mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > SerVal >]
24-Sep-2022
Applied Cryptography and Network Security Workshops
[en] Applied Cryptography and Network Security Workshops
Jianying, Zhou
Springer
LNCS 13285
575–591
Yes
Yes
International
978-3-031-16815-4
Berlin
Germany
ACNS 2022: Applied Cryptography and Network Security Workshops
June 20–23, 2022
ACNS
Rome
Italy
[en] Security ; Artificial intelligence ; Android
[en] In this paper, we propose two empirical studies to (1) detect
Android malware and (2) classify Android malware into families. We
rst (1) reproduce the results of MalBERT using BERT models learning
with Android application's manifests obtained from 265k applications
(vs. 22k for MalBERT) from the AndroZoo dataset in order to detect
malware. The results of the MalBERT paper are excellent and hard to
believe as a manifest only roughly represents an application, we therefore
try to answer the following questions in this paper. Are the experiments
from MalBERT reproducible? How important are Permissions for mal-
ware detection? Is it possible to keep or improve the results by reducing
the size of the manifests? We then (2) investigate if BERT can be used to
classify Android malware into families. The results show that BERT can
successfully di erentiate malware/goodware with 97% accuracy. Further-
more BERT can classify malware families with 93% accuracy. We also
demonstrate that Android permissions are not what allows BERT to
successfully classify and even that it does not actually need it.
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Security Design and Validation Research Group (SerVal)
University of Luxembourg - UL
Android malware detection using BERT
Researchers
http://hdl.handle.net/10993/52627
10.1007/978-3-031-16815-4_31
https://link.springer.com/chapter/10.1007/978-3-031-16815-4_31

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
BERT_Manifest_Article.pdfAuthor preprint261.27 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.