This paper presents a new Android malware detection method based on Graph Neural Networks (GNNs) with Jumping-Knowledge (JK). Android function call graphs (FCGs) consist of a set of program functions and their inter-procedural calls. Thus, this paper proposes a GNN-based method for Android malware detection by capturing meaningful intra-procedural call path patterns. In addition, a Jumping-Knowledge technique is applied to minimize the effect of the over-smoothing problem, which is common in GNNs. The proposed method has been extensively evaluated using two benchmark datasets. The results demonstrate the superiority of our approach compared to state-of-the-art approaches in terms of key classification metrics, which demonstrates the potential of GNNs in Android malware detection and classification.
翻译:本文介绍了一种基于带有“跳动-知识”的图形神经网络(GNN)的新型Android恶意软件检测方法。 Android函数调用图由一套程序函数及其程序间调用组成。因此,本文件建议了一种基于GNN的基于GNN的方法,通过捕捉有意义的程序内调用路径模式来检测Android恶意软件。此外,还采用了一种跳动-知识技术,以尽量减少过度移动问题的影响,这个问题在GNNS中很常见。提议的方法已经用两个基准数据集进行了广泛评估。结果表明,在关键分类指标方面,我们的方法优于最先进的方法,这表明了GNN在机器人恶意软件检测和分类中的潜力。