2021
DOI: 10.1145/3465361
|View full text |Cite
|
Sign up to set email alerts
|

Maat

Abstract: The malware analysis and detection research community relies on the online platform VirusTotal to label Android apps based on the scan results of around 60 antiviral scanners. Unfortunately, there are no standards on how to best interpret the scan results acquired from VirusTotal, which leads to the utilization of different threshold-based labeling strategies (e.g., if 10 or more scanners deem an app malicious, it is considered malicious). While some of the utilized thresholds may be able to accurately approxi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(7 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…To build a ground truth dataset of Indicator objects, we retrieve scanning reports from three services: VirusTotal, HybridAnalysis, and MetaDefender, which are widely used to validate threat indicators [28], [38], [37], [21], [55]. For each attribute type (i.e., malware hashes, domains, URLs, and IP addresses), VirusTotal and MetaDefender provide detection results from various anomaly detection engines, and HybridAnalysis provides a threat score with three status tags (i.e., malicious, suspicious, and no specific threat).…”
Section: A Improper Valuementioning
confidence: 99%
“…To build a ground truth dataset of Indicator objects, we retrieve scanning reports from three services: VirusTotal, HybridAnalysis, and MetaDefender, which are widely used to validate threat indicators [28], [38], [37], [21], [55]. For each attribute type (i.e., malware hashes, domains, URLs, and IP addresses), VirusTotal and MetaDefender provide detection results from various anomaly detection engines, and HybridAnalysis provides a threat score with three status tags (i.e., malicious, suspicious, and no specific threat).…”
Section: A Improper Valuementioning
confidence: 99%
“…As a result, the platform user must choose how to interpret this information to determine if a file is malicious. There are no standard procedures for interpreting scan results from Virus Total to directly tag applications [32]. In this study, malicious files were detected using the signature-based detection method with Virus Total's assist, and the anti-virus programs' responses were evaluated.…”
Section: Evaluation Of Malwarementioning
confidence: 99%
“…First of all, no standards exist on how to interpret the scan results. Several researchers use threshold-based labeling strategies but these thresholds are inconsistent over time as the set and version of scanners used changes [8]. Salem et al propose a machine learning-based labeling schema that outperforms this threshold-based strategy [8].…”
Section: Related Workmentioning
confidence: 99%
“…Peng et al show that phishing detection is difficult for most vendors, that scanning results are not updated immediately and that third-party vendors often not permit to use all functionality or to access the most updated blacklists [10]. While the evaluation and benchmarking of VirusTotal is out of scope for this work, we refer to [8], [9], [11]- [13] for more details.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation