Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alejandro Martín is active.

Publication


Featured researches published by Alejandro Martín.


congress on evolutionary computation | 2016

Genetic boosting classification for malware detection

Alejandro Martín; Héctor D. Menéndez; David Camacho

In the last few years virus writers have made use of new obfuscation techniques with the aim of hindering malware in order to difficult their detection by Anti-Virus engines. Strategies to reverse this trend involve executing potentially malicious programs and monitor the actions they perform in runtime, what is known as dynamic analysis. In this paper we present a method able to reach a high accuracy rate without using this kind of analysis. Instead we use a static analysis approach, which discards those samples that cannot be classified with enough certainty and need, certainly, a dynamic analysis. The K-means clustering algorithm has been used to group samples into regions according to their features. Then a boosting process, guided by a genetic algorithm, is executed in each region that are evaluated using a test dataset discarding those regions which do not reach a minimum accuracy threshold.


intelligent distributed computing | 2016

String-based malware detection for android environments

Alejandro Martín; Héctor D. Menéndez; David Camacho

Android platforms are known as the less security smartphone devices. The increasing number of malicious apps published on Android markets suppose an important threat to users sensitive data, compromising more devices everyday. The commercial solutions that aims to fight against this malware are based on signature methodologies whose detection ratio is low. Furthermore, these engines can be easily defeated by obfuscation techniques, which are extremely common in app plagiarism. This work aims to improve malware detection using only the binary information and the permissions that are normally used by the anti-virus engines, in order to provide a scalable solution based on machine learning. In order to evaluate the performance of this approach, we carry out our experiments using 5000 malware and 5000 benign-ware, and compare the results with 56 Anti-Virus Engines from VirusTotal.


congress on evolutionary computation | 2017

Evolving Deep Neural Networks architectures for Android malware classification

Alejandro Martín; Félix Fuentes-Hurtado; Valery Naranjo; David Camacho

Deep Neural Networks (DNN) have become a powerful, widely used, and successful mechanism to solve problems of different nature and varied complexity. Their ability to build models adapted to complex non-linear problems, have made them a technique widely applied and studied. One of the fields where this technique is currently being applied is in the malware classification problem. The malware classification problem has an increasing complexity, due to the growing number of features needed to represent the behaviour of the application as exhaustively as possible. Although other classification methods, as those based on SVM, have been traditionally used, the DNN pose a promising tool in this field. However, the parameters and architecture setting of these DNNs present a serious restriction, due to the necessary time to find the most appropriate configuration. This paper proposes a new genetic algorithm designed to evolve the parameters, and the architecture, of a DNN with the goal of maximising the malware classification accuracy, and minimizing the complexity of the model. This model is tested against a dataset of malware samples, which are represented using a set of static features, so the DNN has been trained to perform a static malware classification task. The experiments carried out using this dataset show that the genetic algorithm is able to select the parameters and the DNN architecture settings, achieving a 91% accuracy.


In: Luaces, O and Gamez, JA and Barrenechea, E and Troncoso, A and Galar, M and Quintian, H and Corchado, E, (eds.) (Proceedings) 17th Conference of the Spanish-Association-for-Artificial-Intelligence (CAEPIA). (pp. pp. 363-372). SPRINGER-VERLAG BERLIN (2016) | 2016

Studying the Influence of Static API Calls for Hiding Malware

Alejandro Martín; Héctor D. Menéndez; David Camacho

Malware detection has become a challenging task over the last few years. Different concealment strategies such as packing compression, polymorphic encryption and metamorphic obfuscation have produced that malware Analysts need to find more original techniques to discriminate whether a file is malware or not. One of the current benchmark techniques is static analysis of API Calls. This technique aims to detect malware using the API Calls information extracted from the malware files. In this work, we aim to show a complete study of this technique using a behavioural model, built through an evolutionary process, in order to define possible limitations. For this analysis we will use a benchmark dataset to study the discrimination between malware and benignware and evaluate how malware writers are trying to imitate benign behaviour in order to defeat this technique.


Journal of Parallel and Distributed Computing | 2018

EvoDeep: A new evolutionary approach for automatic Deep Neural Networks parametrisation

Alejandro Martín; Raúl Lara-Cabrera; Félix Fuentes-Hurtado; Valery Naranjo; David Camacho

Abstract Deep Neural Networks (DNN) have become a powerful, and extremely popular mechanism, which has been widely used to solve problems of varied complexity, due to their ability to make models fitted to non-linear complex problems. Despite its well-known benefits, DNNs are complex learning models whose parametrisationand architecture are made usually by hand. This paper proposes a new Evolutionary Algorithm, named EvoDeep, devoted to evolve the parameters and the architecture of a DNN in order to maximise its classification accuracy, as well as maintaining a valid sequence of layers. This model is tested against a widely used dataset of handwritten digits images. The experiments performed using this dataset show that the Evolutionary Algorithm is able to select the parameters and the DNN architecture appropriately, achieving a 98.93% accuracy in the best run.


Expert Systems With Applications | 2018

Picking on the family: Disrupting android malware triage by forcing misclassification

Alejandro Calleja; Alejandro Martín; Héctor D. Menéndez; Juan E. Tapiador; David Clark

Machine learning classification algorithms are widely applied to different malware analysis problems because of their proven abilities to learn from examples and perform relatively well with little human input. Use cases include the labelling of malicious samples according to families during triage of suspected malware. However, automated algorithms are vulnerable to attacks. An attacker could carefully manipulate the sample to force the algorithm to produce a particular output. In this paper we discuss one such attack on Android malware classifiers. We design and implement a prototype tool, called IagoDroid, that takes as input a malware sample and a target family, and modifies the sample to cause it to be classified as belonging to this family while preserving its original semantics. Our technique relies on a search process that generates variants of the original sample without modifying their semantics. We tested IagoDroid against RevealDroid, a recent, open source, Android malware classifier based on a variety of static features. IagoDroid successfully forces misclassification for 28 of the 29 representative malware families present in the DREBIN dataset. Remarkably, it does so by modifying just a single feature of the original malware. On average, it finds the first evasive sample in the first search iteration, and converges to a 100% evasive population within 4 iterations. Finally, we introduce RevealDroid*, a more robust classifier that implements several techniques proposed in other adversarial learning domains. Our experiments suggest that RevealDroid* can correctly detect up to 99% of the variants generated by IagoDroid.


Engineering Applications of Artificial Intelligence | 2018

CANDYMAN: Classifying Android malware families by modelling dynamic traces with Markov chains

Alejandro Martín; Víctor Rodríguez-Fernández; David Camacho

Abstract Malware writers are usually focused on those platforms which are most used among common users, with the aim of attacking as many devices as possible. Due to this reason, Android has been heavily attacked for years. Efforts dedicated to combat Android malware are mainly concentrated on detection, in order to prevent malicious software to be installed in a target device. However, it is equally important to put effort into an automatic classification of the type, or family, of a malware sample, in order to establish which actions are necessary to mitigate the damage caused. In this paper, we present CANDYMAN, a tool that classifies Android malware families by combining dynamic analysis and Markov chains. A dynamic analysis process allows to extract representative information of a malware sample, in form of a sequence of states, while a Markov chain allows to model the transition probabilities between the states of the sequence, which will be used as features in the classification process. The space of features built is used to train classical Machine Learning, including methods for imbalanced learning, and Deep Learning algorithms, over a dataset of malware samples from different families, in order to evaluate the proposed method. Using a collection of 5,560 malware samples grouped into 179 different families (extracted from the Drebin dataset), and once made a selection based on a minimum number of relevant and valid samples, a final set of 4,442 samples grouped into 24 different malware families was used. The experimental results indicate a precision performance of 81.8% over this dataset.


soft computing | 2017

MOCDroid: multi-objective evolutionary classifier for Android malware detection

Alejandro Martín; Héctor D. Menéndez; David Camacho


ieee symposium series on computational intelligence | 2016

ADROIT: Android malware detection using meta-information

Alejandro Martín; Alejandro Calleja; Héctor D. Menéndez; Juan E. Tapiador; David Camacho


IEEE Access | 2018

An in-depth study of the Jisut family of Android ransomware

Alejandro Martín; Julio C. Hernandez-Castro; David Camacho

Collaboration


Dive into the Alejandro Martín's collaboration.

Top Co-Authors

Avatar

David Camacho

Autonomous University of Madrid

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Félix Fuentes-Hurtado

Polytechnic University of Valencia

View shared research outputs
Top Co-Authors

Avatar

Raúl Lara-Cabrera

Autonomous University of Madrid

View shared research outputs
Top Co-Authors

Avatar

Valery Naranjo

Polytechnic University of Valencia

View shared research outputs
Top Co-Authors

Avatar

David Clark

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge