Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lichao Sun is active.

Publication


Featured researches published by Lichao Sun.


IEEE Transactions on Industrial Informatics | 2018

Android Malware Detection

Jin Li; Lichao Sun; Qiben Yan; Zhiqiang Li; Witawas Srisa-an; Heng Ye

The alarming growth rate of malicious apps has become a serious issue that sets back the prosperous mobile ecosystem. A recent report indicates that a new malicious app for Android is introduced every 10 s. To combat this serious malware campaign, we need a scalable malware detection approach that can effectively and efficiently identify malware apps. Numerous malware detection tools have been developed, including system-level and network-level approaches. However, scaling the detection for a large bundle of apps remains a challenging task. In this paper, we introduce Significant Permission IDentification (SigPID), a malware detection system based on permission usage analysis to cope with the rapid increase in the number of Android malware. Instead of extracting and analyzing all Android permissions, we develop three levels of pruning by mining the permission data to identify the most significant permissions that can be effective in distinguishing between benign and malicious apps. SigPID then utilizes machine-learning-based classification methods to classify different families of malware and benign apps. Our evaluation finds that only 22 permissions are significant. We then compare the performance of our approach, using only 22 permissions, against a baseline approach that analyzes all permissions. The results indicate that when a support vector machine is used as the classifier, we can achieve over 90% of precision, recall, accuracy, and F-measure, which are about the same as those produced by the baseline approach while incurring the analysis times that are 4–32 times less than those of using all permissions. Compared against other state-of-the-art approaches, SigPID is more effective by detecting 93.62% of malware in the dataset and 91.4% unknown/new malware samples.


international conference on malicious and unwanted software | 2016

SigPID: significant permission identification for android malware detection

Lichao Sun; Zhiqiang Li; Qiben Yan; Witawas Srisa-an; Yu Pan

A recent report indicates that a newly developed malicious app for Android is introduced every 11 seconds. To combat this alarming rate of malware creation, we need a scalable malware detection approach that is effective and efficient. In this paper, we introduce SIGPID, a malware detection system based on permission analysis to cope with the rapid increase in the number of Android malware. Instead of analyzing all 135 Android permissions, our approach applies 3-level pruning by mining the permission data to identify only significant permissions that can be effective in distinguishing benign and malicious apps. SIGPID then utilizes classification algorithms to classify different families of malware and benign apps. Our evaluation finds that only 22 out of 135 permissions are significant. We then compare the performance of our approach, using only 22 permissions, against a baseline approach that analyzes all permissions. The results indicate that when Support Vector Machine (SVM) is used as the classifier, we can achieve over 90% of precision, recall, accuracy, and F-measure, which are about the same as those produced by the baseline approach while incurring the analysis times that are 4 to 32 times smaller that those of using all 135 permissions. When we compare the detection effectiveness of SIGPID to those of other approaches, SIGPID can detect 93.62% of malware in the data set, and 91.4% unknown malware.


international conference on security and privacy in communication systems | 2016

DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware

Zhiqiang Li; Lichao Sun; Qiben Yan; Witawas Srisa-an; Zhenxiang Chen

A recent report has shown that there are more than 5,000 malicious applications created for Android devices each day. This creates a need for researchers to develop effective and efficient malware classification and detection approaches. To address this need, we introduce DroidClassifier: a systematic framework for classifying network traffic generated by mobile malware. Our approach utilizes network traffic analysis to construct multiple models in an automated fashion using a supervised method over a set of labeled malware network traffic (the training dataset). Each model is built by extracting common identifiers from multiple HTTP header fields. Adaptive thresholds are designed to capture the disparate characteristics of different malware families. Clustering is then used to improve the classification efficiency. Finally, we aggregate the multiple models to construct a holistic model to conduct cluster-level malware classification. We then perform a comprehensive evaluation of DroidClassifier by using 706 malware samples as the training set and 657 malware samples and 5,215 benign apps as the testing set. Collectively, these malicious and benign apps generate 17,949 network flows. The results show that DroidClassifier successfully identifies over 90% of different families of malware with more than 90% accuracy with accessible computational cost. Thus, DroidClassifier can facilitate network management in a large network, and enable unobtrusive detection of mobile malware. By focusing on analyzing network behaviors, we expect DroidClassifier to work with reasonable accuracy for other mobile platforms such as iOS and Windows Mobile as well.


european conference on machine learning | 2017

Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning

Lichao Sun; Yuqi Wang; Bokai Cao; Philip S. Yu; Witawas Srisa-an; Alex D. Leow

With the rapid growth in smartphone usage, more organizations begin to focus on providing better services for mobile users. User identification can help these organizations to identify their customers and then cater services that have been customized for them. Currently, the use of cookies is the most common form to identify users. However, cookies are not easily transportable (e.g., when a user uses a different login account, cookies do not follow the user). This limitation motivates the need to use behavior biometric for user identification. In this paper, we propose DEEPSERVICE, a new technique that can identify mobile users based on users keystroke information captured by a special keyboard or web browser. Our evaluation results indicate that DEEPSERVICE is highly accurate in identifying mobile users (over 93% accuracy). The technique is also efficient and only takes less than 1 ms to perform identification.


knowledge discovery and data mining | 2018

Multi-Round Influence Maximization

Lichao Sun; Weiran Huang; Philip S. Yu; Wei Chen

In this paper, we study the Multi-Round Influence Maximization (MRIM) problem, where influence propagates in multiple rounds independently from possibly different seed sets, and the goal is to select seeds for each round to maximize the expected number of nodes that are activated in at least one round. MRIM problem models the viral marketing scenarios in which advertisers conduct multiple rounds of viral marketing to promote one product. We consider two different settings: 1) the non-adaptive MRIM, where the advertiser needs to determine the seed sets for all rounds at the very beginning, and 2) the adaptive MRIM, where the advertiser can select seed sets adaptively based on the propagation results in the previous rounds. For the non-adaptive setting, we design two algorithms that exhibit an interesting tradeoff between efficiency and effectiveness: a cross-round greedy algorithm that selects seeds at a global level and achieves


international conference on big data | 2017

Contaminant removal for Android malware detection systems

Lichao Sun; Xiaokai Wei; Jiawei Zhang; Lifang He; Philip S. Yu; Witawas Srisa-an

1/2 - varepsilon


conference on information and knowledge management | 2017

Coupled Sparse Matrix Factorization for Response Time Prediction in Logistics Services

Yuqi Wang; Jiannong Cao; Lifang He; Wengen Li; Lichao Sun; Philip S. Yu

approximation ratio, and a within-round greedy algorithm that selects seeds round by round and achieves


IEEE Transactions on Industrial Informatics | 2018

Significant Permission Identification for Machine-Learning-Based Android Malware Detection

Jin Li; Lichao Sun; Qiben Yan; Zhiqiang Li; Witawas Srisa-an; Heng Ye

1-e^-(1-1/e) -varepsilon approx 0.46 - varepsilon


international conference on distributed computing systems | 2018

Deep Learning towards Mobile Applications

Ji Wang; Bokai Cao; Philip S. Yu; Lichao Sun; Weidong Bao; Xiaomin Zhu

approximation ratio but saves running time by a factor related to the number of rounds. For the adaptive setting, we design an adaptive algorithm that guarantees


arXiv: Social and Information Networks | 2018

Joint Embedding of Meta-Path and Meta-Graph for Heterogeneous Information Networks.

Lichao Sun; Lifang He; Zhipeng Huang; Bokai Cao; Congying Xia; Xiaokai Wei; Philip S. Yu

1-e^-(1-1/e) -varepsilon

Collaboration


Dive into the Lichao Sun's collaboration.

Top Co-Authors

Avatar

Philip S. Yu

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Witawas Srisa-an

University of Nebraska–Lincoln

View shared research outputs
Top Co-Authors

Avatar

Qiben Yan

University of Nebraska–Lincoln

View shared research outputs
Top Co-Authors

Avatar

Zhiqiang Li

University of Nebraska–Lincoln

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bokai Cao

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Heng Ye

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Jin Li

Guangzhou University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge