Android Malware Detection (AMD) Based on Shallow Feature and Permission Correlation

Authors

  • Jung-San Lee 1Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan 2Cybersecurity Technology Institute, Institute for Information Industry, Taipei, Taiwan
  • Yun-Yi Fan Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan
  • Gah Wee Yong Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan
  • Ying Chin Chen Feng Chia University, Department of Information Engineering and Computer Science

DOI:

https://doi.org/10.34190/icair.5.1.4392

Keywords:

Machine learning, Malware detection, Static analysis, Shallow features, Permission correlation

Abstract

There are apps for everything, from online banking, social software to shopping. They have become one of the most important tools in our daily lives. This even implies that a mobile device has stored most of personal information, including photos, credit cards, and communications. If an intruder succeeds in hacking into the mobile device, all private properties must suffer from the leakage threats. Undoubtedly, a malware is the commonest tool used by an attacker to compromise a mobile phone. In particular, it is often disguised as a popular application through an obfuscated or packed form. That is the main reason why it is difficult to distinguish a malware from the legal ones. In this article, we have adopted machine learning technique to develop a static analysis mechanism for Android malware detection based on shallow feature and permission correlation (AMD). AMD first analyses the Application Programming Interfaces of the target to detect all possible and hidden privilege threats. It then filters this obfuscation information using permission correlation to eliminate noise and identify meaningful malicious indicators. The proposed approach leverages the correlation patterns between permissions and API calls to distinguish suspicious behaviours from legitimate ones. Thus, AMD can extract all the representative shallow features to achieve the high detection rate. Simulation results have shown that AMD can outperform related works under the datasets of CICAndMal2017 and CICMalDroid2020, which confirms the effectiveness of shallow features and permission correlation.

Author Biographies

Jung-San Lee, 1Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan 2Cybersecurity Technology Institute, Institute for Information Industry, Taipei, Taiwan

Jung-San Lee received the Ph.D. degree in computer science and information engineering from National Chung Cheng University, Chiayi, Taiwan, in 2008. From 2023, he has been working as a distinguished professor with the Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan. Since 2024, he has served as vice president and director general of Cybersecurity Technology Institute, Institute for Information Industry, Taipei, Taiwan. His current research interests include cybersecurity, zero trust architecture, electronic commerce, and blockchain.

Yun-Yi Fan, Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan

Yun-Yi Fan is currently working toward the Ph.D. degree in information engineering and computer science with Feng Chia University, Taichung, Taiwan. Her current research interests include information security and blockchain applications.

Gah Wee Yong, Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan

Gah Wee Yong received the M.S. degree in information engineering and computer science from Feng Chia University, Taichung, Taiwan, in 2023. His current research interests include malware detection and network security.

Ying Chin Chen, Feng Chia University, Department of Information Engineering and Computer Science

Ying-Chin Chen is currently pursuing the Ph.D. degree in Information Engineering and Computer Science with Feng Chia University, Taichung, Taiwan. Her current research interests include information security and operation technology security.

Downloads

Published

2025-12-10