Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2026, Vol. 52 ›› Issue (3): 190-200. doi: 10.19678/j.issn.1000-3428.0070073

• Cyberspace Security • Previous Articles     Next Articles

Android Malware Detection Method Based on Static Feature Combination in Graph Neural Networks

WEI Haodong1,2, WAN Liang1,2,*()   

  1. 1. State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, Guizhou, China
    2. College of Computer Science and Technology, Guizhou University, Guiyang 550025, Guizhou, China
  • Received:2024-07-03 Revised:2024-09-21 Online:2026-03-15 Published:2026-03-10
  • Contact: WAN Liang

基于静态特征组合的图神经网络Android恶意软件检测方法

韦昊东1,2, 万良1,2,*()   

  1. 1. 贵州大学公共大数据国家重点实验室, 贵州 贵阳 550025
    2. 贵州大学计算机科学与技术学院, 贵州 贵阳 550025
  • 通讯作者: 万良
  • 作者简介:

    韦昊东, 男, 硕士研究生, 主研方向为人工智能、信息安全

    万良(通信作者), 教授、博士、博士生导师

  • 基金资助:
    国家自然科学基金地区科学基金项目(62262004)

Abstract:

Android is currently the most widely used operating system for mobile smart terminals; however, the constant emergence of Android malware poses a significant threat to users. Some methods process the features extracted from static analysis to detect Android malware. These methods can reflect some attributes of the software but cannot capture the characteristics of the potential intentions behind malicious behavior; therefore, achieving good detection performance when facing Android malware with evasion capabilities is a challenge. To address this issue, this study proposes an Android malware detection method based on static feature combination in Graph Neural Network (GNN). The function call graph is extracted from the decompiled file. node2vec is used to construct the local structural features of each node, the functions of each node are analyzed, opcodes are extracted and classified, the Katz algorithm is used to calculate node importance, and the importance coefficient of each Application Program Interface (API) node in the graph is calculated for the Android malware and its malicious family according to the TF-IDF algorithm. These features are combined into node features, and feature self-looping is performed on important nodes to enhance the feature differences between nodes. On this basis, a classifier, DAg_MAL, based on a Directed GNN (DGCN) and Graph Attention Network (GAT) is designed. The classifier adopts a gPool layer, which can effectively capture the key call relationships in software behavior and exclude unimportant nodes. Experimental results show that the proposed method achieves good performance in both binary and multi-classification tasks, outperforming other similar methods.

Key words: Android, malware detection, static analysis, Graph Neural Network (GNN), feature embedding, digraph

摘要:

安卓(Android)是目前移动智能终端使用最广泛的操作系统, 但层出不穷的Android恶意软件给用户带来重大威胁。一些方法对静态分析提取的特征进行处理, 以实现Android恶意软件检测, 这些方法能够反映软件的一部分属性, 但无法捕捉软件潜在恶意行为意图的特征, 使得在面对具备逃避能力的Android恶意软件时难以取得良好的检测性能。为解决该问题, 提出一种基于静态特征组合的图神经网络Android恶意软件检测方法。从反编译文件中提取函数调用图, 采用node2vec构建每个节点的局部结构特征, 同时分析每个节点函数, 提取操作码并进行分类, 使用Katz算法计算节点重要程度, 并根据TF-IDF算法计算图中每个应用程序接口(API)节点对于该Android恶意软件以及所属恶意家族的重要系数, 将这些特征相结合作为节点特征, 对重要节点进行特征自环, 以增强节点间的特征差异。在此基础上, 设计基于有向图神经网络(DGCN)与图注意力网络(GAT)的分类器DAg_MAL, 该分类器采用gPool层, 能有效捕获软件行为的关键调用关系, 并筛除不重要的节点。实验结果表明, 该方法在二分类与多分类任务中都取得了良好的性能表现, 总体检测性能优于其他同类方法。

关键词: 安卓, 恶意软件检测, 静态分析, 图神经网络, 特征嵌入, 有向图