Igor Muttik
Intel
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Igor Muttik.
integrated formal methods | 2016
Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik
Machine-learning-based Android malware classifiers perform badly on the detection of new malware, in particular, when they take API calls and permissions as input features, which are the best performing features known so far. This is mainly because signature-based features are very sensitive to the training data and cannot capture general behaviours of identified malware. To improve the robustness of classifiers, we study the problem of learning and verifying unwanted behaviours abstracted as automata. They are common patterns shared by malware instances but rarely seen in benign applications, e.g., intercepting and forwarding incoming SMS messages. We show that by taking the verification results against unwanted behaviours as input features, the classification performance of detecting new malware is improved dramatically. In particular, the precision and recall are respectively 8 and 51 points better than those using API calls and permissions, measured against industrial datasets collected across several years. Our approach integrates several methods: formal methods, machine learning and text mining techniques. It is the first to automatically generate unwanted behaviours for Android malware detection. We also demonstrate unwanted behaviours constructed for well-known malware families. They compare well to those described in human-authored descriptions of these families.
Archive | 2017
As Irina Mariuca; Jorge Blasco; Thomas M. Chen; Harsha Kumara Kalutarage; Igor Muttik; Hoang Nga Nguyen; Markus Roggenbach; Siraj A. Shaikh
Malware has been a major problem in desktop computing for decades. With the recent trend towards mobile computing, malware is moving rapidly to smartphone platforms. “Total mobile malware has grown 151% over the past year”, according to McAfee®’s quarterly treat report in September 2016. By design, AndroidTM is “open” to download apps from different sources. Its security depends on restricting apps by combining digital signatures, sandboxing, and permissions. Unfortunately, these restrictions can be bypassed, without the user noticing, by colluding apps for which combined permissions allow them to carry out attacks. In this chapter we report on recent and ongoing research results from our ACID project which suggest a number of reliable means to detect collusion, tackling the aforementioned problems. We present our conceptual work on the topic of collusion and discuss a number of automated tools arising from it.
european workshop on system security | 2016
Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik
Current machine-learning-based malware detection seldom provides information about why an app is considered bad. We study the automatic explanation of unwanted behaviours in mobile malware, e.g., sending premium SMS messages. Our approach combines machine learning and text mining techniques to produce explanations in natural language. It selects keywords from features used in malware classifiers, and presents the sentences chosen from human-authored malware analysis reports by using these keywords. The explanation elaborates how a system decision was made. As far as we know, this is the first attempt to generate explanations in natural language by mining the reports written by human malware analysts, resulting in a scalable and entirely data-driven method.
arXiv: Software Engineering | 2016
Irina Mariuca Asavoae; Jorge Blasco; Thomas M. Chen; Harsha Kumara Kalutarage; Igor Muttik; Hoang Nga Nguyen; Markus Roggenbach; Siraj A. Shaikh
Archive | 2013
Igor Muttik; Roman Dementiev; Alex Nayshtut
wireless network security | 2016
Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik
Journal of Network and Computer Applications | 2017
Jorge Blasco; Thomas M. Chen; Igor Muttik; Markus Roggenbach
Archive | 2016
Igor Muttik
IMPS@ESSoS | 2016
Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik
CEUR-WS.org | 2016
Wei Chen; David Aspinall; Andrew D. Gordon; Charles A. Sutton; Igor Muttik