%0 Journal Article %T A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A Hasan, Hayyan Salman %A Deeb, Hasan Muhammad %A Tork Ladani, Behrouz %D 2023 %\ 01/01/2023 %V 15 %N 1 %P 59-71 %! A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware %K Sensitive methods %K Evasion methods %K Payload methods %K Dynamic analysis %K Machine Learning %R 10.22042/isecure.2022.321436.741 %X Sensitive methods are those that are commonly used by Android malware to perform malicious behavior. These methods may be either evasion or malicious payload methods. Although there are several approaches to handle these methods for performing effective dynamic malware analysis, but generally most of them are based on a manually created list. However, the performance shown by the selected approaches is dependent on completeness of the manually created list that is not almost a complete and up-to-date one. Missing some sensitive methods causes to degrade the overall performance and affects the effectiveness of analyzing Android malware.In this paper, we propose a machine learning approach to predict new sensitive methods that might be used in Android malware. We use a manually collected training dataset to train two classifiers: a classifier for detecting the sensitivity nature of the Android methods, and another classifier to categorize the detected sensitive methods into predefined categories. We applied the proposed approach to a large number of methods extracted from Android API 27. The proposed approach is able to predict hundreds of sensitive methods with accuracy of 90.5% for the first classifier and 87.4% for the second classifier. To evaluate the proposed approach, we built a new list of the detected sensitive methods and used it in a number of tools to perform dynamic malware analysis. The proposed model found various sensitive methods that were not considered before by any other tools. Hence, the effectiveness of these tools in performing dynamic analysis are increased. %U https://www.isecure-journal.com/article_151761_218b362a298b30abedef381423222c73.pdf