Explainable Android Malware Detection and Malicious Code Localization Using Graph Attention
By: Merve Cigdem Ipek, Sevil Sen
Potential Business Impact:
Finds hidden bad code in phone apps.
With the escalating threat of malware, particularly on mobile devices, the demand for effective analysis methods has never been higher. While existing security solutions, including AI-based approaches, offer promise, their lack of transparency constraints the understanding of detected threats. Manual analysis remains time-consuming and reliant on scarce expertise. To address these challenges, we propose a novel approach called XAIDroid that leverages graph neural networks (GNNs) and graph attention mechanisms for automatically locating malicious code snippets within malware. By representing code as API call graphs, XAIDroid captures semantic context and enhances resilience against obfuscation. Utilizing the Graph Attention Model (GAM) and Graph Attention Network (GAT), we assign importance scores to API nodes, facilitating focused attention on critical information for malicious code localization. Evaluation on synthetic and real-world malware datasets demonstrates the efficacy of our approach, achieving high recall and F1-score rates for malicious code localization. The successful implementation of automatic malicious code localization enhances the scalability, interpretability, and reliability of malware analysis.
Similar Papers
IoT-based Android Malware Detection Using Graph Neural Network With Adversarial Defense
Cryptography and Security
Finds bad apps and makes them harder to trick.
VOLTRON: Detecting Unknown Malware Using Graph-Based Zero-Shot Learning
Cryptography and Security
Finds new phone viruses without seeing them before.
Framework GNN-AID: Graph Neural Network Analysis Interpretation and Defense
Machine Learning (CS)
Helps AI understand and protect graph data.