Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Igor Muttik is active.

Publication


Featured researches published by Igor Muttik.


integrated formal methods | 2016

On Robust Malware Classifiers by Verifying Unwanted Behaviours

Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik

Machine-learning-based Android malware classifiers perform badly on the detection of new malware, in particular, when they take API calls and permissions as input features, which are the best performing features known so far. This is mainly because signature-based features are very sensitive to the training data and cannot capture general behaviours of identified malware. To improve the robustness of classifiers, we study the problem of learning and verifying unwanted behaviours abstracted as automata. They are common patterns shared by malware instances but rarely seen in benign applications, e.g., intercepting and forwarding incoming SMS messages. We show that by taking the verification results against unwanted behaviours as input features, the classification performance of detecting new malware is improved dramatically. In particular, the precision and recall are respectively 8 and 51 points better than those using API calls and permissions, measured against industrial datasets collected across several years. Our approach integrates several methods: formal methods, machine learning and text mining techniques. It is the first to automatically generate unwanted behaviours for Android malware detection. We also demonstrate unwanted behaviours constructed for well-known malware families. They compare well to those described in human-authored descriptions of these families.


Archive | 2017

Detecting Malicious Collusion Between Mobile Software Applications: The Android TM Case

As Irina Mariuca; Jorge Blasco; Thomas M. Chen; Harsha Kumara Kalutarage; Igor Muttik; Hoang Nga Nguyen; Markus Roggenbach; Siraj A. Shaikh

Malware has been a major problem in desktop computing for decades. With the recent trend towards mobile computing, malware is moving rapidly to smartphone platforms. “Total mobile malware has grown 151% over the past year”, according to McAfee®’s quarterly treat report in September 2016. By design, AndroidTM is “open” to download apps from different sources. Its security depends on restricting apps by combining digital signatures, sandboxing, and permissions. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps for which combined permissions allow them to carry out attacks. In this chapter we report on recent and ongoing research results from our ACID project which suggest a number of reliable means to detect collusion, tackling the aforementioned problems. We present our conceptual work on the topic of collusion and discuss a number of automated tools arising from it.


european workshop on system security | 2016

A text-mining approach to explain unwanted behaviours

Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik

Current machine-learning-based malware detection seldom provides information about why an app is considered bad. We study the automatic explanation of unwanted behaviours in mobile malware, e.g., sending premium SMS messages. Our approach combines machine learning and text mining techniques to produce explanations in natural language. It selects keywords from features used in malware classifiers, and presents the sentences chosen from human-authored malware analysis reports by using these keywords. The explanation elaborates how a system decision was made. As far as we know, this is the first attempt to generate explanations in natural language by mining the reports written by human malware analysts, resulting in a scalable and entirely data-driven method.


arXiv: Software Engineering | 2016

Towards Automated Android App Collusion Detection

Irina Mariuca Asavoae; Jorge Blasco; Thomas M. Chen; Harsha Kumara Kalutarage; Igor Muttik; Hoang Nga Nguyen; Markus Roggenbach; Siraj A. Shaikh


Archive | 2013

Detection of unauthorized memory modification and access using transactional memory

Igor Muttik; Roman Dementiev; Alex Nayshtut


wireless network security | 2016

More Semantics More Robust: Improving Android Malware Classifiers

Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik


Journal of Network and Computer Applications | 2017

Detection of app collusion potential using logic programming

Jorge Blasco; Thomas M. Chen; Igor Muttik; Markus Roggenbach


Archive | 2016

ROBOTIC SYSTEM FOR UPDATING DEVICES

Igor Muttik


IMPS@ESSoS | 2016

Explaining Unwanted Behaviours in Context

Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik


CEUR-WS.org | 2016

Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016)

Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik

Collaboration


Dive into the Igor Muttik's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei Chen

University of Edinburgh

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge