leads to a large number of parameters being associ-
ated with the model, resulting in a larger model size
for 3C2D.
6 CONCLUSION
In this paper, we have empirically analyzed the per-
formance of image based malware detection and clas-
sification techniques. Each approach converts an
APK to either a grayscale or a color image. These
converted images are then input to CNN-based mod-
els like Resnet50, MobileNetV2, and 3C2D to distin-
guish between benign and malware samples as well
as identify the various malware families. We have
used two widely used open-source datasets, CICAnd-
Mal2017 and the Drebin dataset for our experiments.
Our experimental results show that 3C2D is capa-
ble of providing the most accurate performance for
grayscale-based techniques. Based on the observa-
tions and insights obtained from this work, in fu-
ture, we intend to design lightweight malware detec-
tion and categorization strategies suitable for resource
constrained environments like mobile devices. More-
over, we wish to explore different non-image based
features as well for malware classification.
ACKNOWLEDGEMENT
The authors gratefully acknowledge the computing
time provided on the high performance computing fa-
cility, Sharanga, at the Birla Institute of Technology
and Science - Pilani, Hyderabad Campus.
REFERENCES
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., and
Rieck, K. (2014). Drebin: Effective and explain-
able detection of android malware in your pocket. In
NDSS. The Internet Society.
Conti, G., Dean, E., Sinda, M., and Sangster, B. (2008). Vi-
sual reverse engineering of binary and data files. In In-
ternational Workshop on Visualization for Computer
Security, page 1 – 17.
Fang, Y., Gao, Y., Jing, F., and Zhang, L. (2020). Android
malware familial classification based on dex file sec-
tion features. IEEE Access, 8:10614–10627.
Gibert, D., Mateu, C., and Planes, J. (2020). Hydra: A mul-
timodal deep learning framework for malware classi-
fication. Computers & Security, 95:101873.
He, K., Zhang, X., Ren, S., and Sun, J. (2015). Deep resid-
ual learning for image recognition.
Joyce, R. J., Amlani, D., Nicholas, C., and Raff, E. (2023).
Motif: A malware reference dataset with ground truth
family labels. Computers & Security, 124:102921.
Kalash, M., Rochan, M., Mohammed, N., Bruce, N. D. B.,
Wang, Y., and Iqbal, F. (2018). Malware classification
with deep convolutional neural networks. In 2018 9th
IFIP International Conference on New Technologies,
Mobility and Security (NTMS), pages 1–5.
Kumar, A., Sagar, K. P., Kuppusamy, K. S., and Aghila, G.
(2016). Machine learning based malware classifica-
tion for android applications using multimodal image
representations. In 2016 10th International Confer-
ence on Intelligent Systems and Control (ISCO), pages
1–6.
Lashkari, A. H., Kadir, A. F. A., Taheri, L., and Ghor-
bani, A. A. (2018). Toward developing a system-
atic approach to generate benchmark android malware
datasets and classification. In 2018 International Car-
nahan Conference on Security Technology (ICCST),
pages 1–7.
Mohammed, T. M., Nataraj, L., Chikkagoudar, S., Chan-
drasekaran, S., and Manjunath, B. (2021). Malware
detection using frequency domain-based image visu-
alization and deep learning. In Proceedings of the 54th
Hawaii International Conference on System Sciences,
page 7132.
Nataraj, L., Karthikeyan, S., Jacob, G., and Manjunath, B.
(2011). Malware images: Visualization and automatic
classification.
Ni, S., Qian, Q., and Zhang, R. (2018). Malware identifi-
cation using visualization images and deep learning.
Computers & Security, 77:871–885.
O’Shaughnessy, S. and Sheridan, S. (2022). Image-
based malware classification hybrid framework based
on space-filling curves. Computers & Security,
116:102660.
Sandler, M., Howard, A., Zhu, M., Zhmoginov, A., and
Chen, L.-C. (2019). Mobilenetv2: Inverted residuals
and linear bottlenecks.
Spreitzenbarth, M., Freiling, F., Echtler, F., Schreck, T.,
and Hoffmann, J. (2013). Mobile-sandbox: Having a
deeper look into android applications. In Proceedings
of the 28th Annual ACM Symposium on Applied Com-
puting, SAC ’13, page 1808–1815, New York, NY,
USA. Association for Computing Machinery.
Zhang, W., Luktarhan, N., Ding, C., and Lu, B. (2021). An-
droid malware detection using tcn with bytecode im-
age. Symmetry, 13(7).
Zhu, H., Wei, H., Wang, L., Xu, Z., and Sheng, V. S.
(2023). An effective end-to-end android malware de-
tection method. Expert Systems with Applications,
218:119593.
¨
Unver, H. and Bakour, K. (2020). Android malware de-
tection based on image-based features and machine
learning techniques. SN Applied Sciences, 2(1299).
Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration
869