{"id":809,"date":"2019-06-24T13:52:48","date_gmt":"2019-06-24T11:52:48","guid":{"rendered":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/"},"modified":"2019-06-24T13:52:48","modified_gmt":"2019-06-24T11:52:48","slug":"phd-defense-creating-better-ground-truth-to-further-understand-android-malware","status":"publish","type":"events","link":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/","title":{"rendered":"PhD Defense: Creating better ground truth to further understand Android malware"},"content":{"rendered":"<section class=\"wp-block-unilux-blocks-free-section section\"><div class=\"container xl:max-w-screen-xl\"><p><strong>Members of the defense committee<\/strong>:<\/p><ul class=\"ulux-list\"><li class=\"ulux-list-item\">Dr Jacques Klein, University of Luxembourg, Chairman<\/li><li class=\"ulux-list-item\">A-prof. Dr Jean-Fran\u00e7ois Lalande, Centrale Sup\u00e9lec, Deputy Chairman<\/li><li class=\"ulux-list-item\">Prof. Dr Yves Le Traon, University of Luxembourg, \u00a0Member<\/li><li class=\"ulux-list-item\">Dr Tegawend\u00e9 F. Bissyand\u00e9, University of Luxembourg, Member<\/li><li class=\"ulux-list-item\">Dr Damien Octeau, Google Inc, Member<\/li><\/ul><p><strong>Abstract<\/strong>:<\/p><p>Mobile applications are essential for interacting with technology and other people.<\/p><p>With more than 2 billion devices deployed all over the world, Android offers a thriving ecosystem by making accessible the work of thousands of developers on digital marketplaces such as Google Play.<\/p><p>Nevertheless, the success of Android also exposes millions of users to malware authors who seek to siphon private information and hijack mobile devices for their benefits.<\/p><p>To fight against the proliferation of Android malware, the security community embraced machine learning, a branch of artificial intelligence that powers a new generation of detection systems.<\/p><p>Machine learning algorithms, however, require a substantial number of qualified samples to learn the classification rules enforced by security experts.<\/p><p>Unfortunately, malware ground truths are notoriously hard to construct due to the inherent complexity of Android applications and the global lack of public information about malware.<\/p><p>In a context where both information and human resources are limited, the security community is in demand for new approaches to aid practitioners to accurately define Android malware, automate classification decisions, and improve the comprehension of Android malware.<\/p><p>This dissertation proposes three solutions to assist with the creation of malware ground truths.<\/p><p>The first contribution is STASE, an analytical framework that qualifies the composition of malware ground truths.<\/p><p>STASE reviews the information shared by antivirus products with nine metrics in order to support the reproducibility of research experiments and detect potential biases.<\/p><p>This dissertation reports the results of STASE against three typical settings and suggests additional recommendations for designing experiments based on Android malware.<\/p><p>The second contribution is EUPHONY, a heuristic system built to unify family clusters belonging to malware ground truths.<\/p><p>EUPHONY exploits the co-occurrence of malware labels obtained from antivirus reports to study the relationship between Android applications and proposes a single family name per sample for the sake of facilitating malware experiments.<\/p><p>This dissertation evaluates EUPHONY on well-known malware ground truths to assess the precision of our approach and produce a large dataset of malware tags for the research community.<\/p><p>The third contribution is AP-GRAPH, a knowledge database for dissecting the characteristics of malware ground truths.<\/p><p>AP-GRAPH leverages the results of EUPHONY and static analysis to index artefacts that are highly correlated with malware activities and recommend the inspection of the most suspicious components.<\/p><p>This dissertation explores the set of artefacts retrieved by AP-GRAPH from popular malware families to track down their correlation and their evolution compared to other malware populations.<\/p><\/div><\/section>","protected":false},"excerpt":{"rendered":"<p>Members of the defense committee:Dr Jacques Klein, University of Luxembourg, ChairmanA-prof. Dr Jean-Fran\u00e7ois Lalande, Centrale Sup\u00e9lec, Deputy ChairmanProf. Dr Yves Le Traon, University of Luxembourg, \u00a0MemberDr Tegawend\u00e9 F. Bissyand\u00e9, University of Luxembourg, MemberDr Damien Octeau, Google Inc, Member<\/p>\n","protected":false},"author":0,"featured_media":810,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"featured_image_focal_point":[],"show_featured_caption":false,"ulux_newsletter_groups":"","uluxPostTitle":"","uluxPrePostTitle":"","_trash_the_other_posts":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"event_start_date":"2019-07-01 14:30:00","event_end_date":"2019-07-01 18:00:00","event_speaker_name":"M\u00e9d\u00e9ric Hurier ","event_speaker_link":"","event_is_online":false,"event_location":"Room E004, JFK Building\t\r\n29 Avenue J.F. Kennedy\t\r\nL-1855 Kirchberg","event_street":"","event_location_link":"","event_zip_code":"","event_city":"","event_country":"LU"},"events-topic":[],"events-type":[],"organisation":[183],"authorship":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.3 (Yoast SEO v22.3) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PhD Defense: Creating better ground truth to further understand Android malware - SnT - Universit\u00e9 du Luxembourg I Uni.lu<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PhD Defense: Creating better ground truth to further understand Android malware\" \/>\n<meta property=\"og:description\" content=\"Members of the defense committee:Dr Jacques Klein, University of Luxembourg, ChairmanA-prof. Dr Jean-Fran\u00e7ois Lalande, Centrale Sup\u00e9lec, Deputy ChairmanProf. Dr Yves Le Traon, University of Luxembourg, \u00a0MemberDr Tegawend\u00e9 F. Bissyand\u00e9, University of Luxembourg, MemberDr Damien Octeau, Google Inc, Member\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"SnT FR\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/\",\"name\":\"PhD Defense: Creating better ground truth to further understand Android malware - SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"isPartOf\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2019\/06\/phd_defense_creating_better_ground_truth_to_further_understand_android_malware-scaled.jpg\",\"datePublished\":\"2019-06-24T11:52:48+00:00\",\"dateModified\":\"2019-06-24T11:52:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#primaryimage\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2019\/06\/phd_defense_creating_better_ground_truth_to_further_understand_android_malware-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2019\/06\/phd_defense_creating_better_ground_truth_to_further_understand_android_malware-scaled.jpg\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.uni.lu\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Interdisciplinary Centre for Security, Reliability and Trust (SnT)\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Events\",\"item\":\"https:\/\/www.uni.lu\/snt-fr\/events\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"PhD Defense: Creating better ground truth to further understand Android malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#website\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"name\":\"SnT\",\"description\":\"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu\",\"publisher\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\"},\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#organization\",\"name\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\",\"alternateName\":\"Interdisciplinary Centre for Security, Reliability and Trust\",\"url\":\"https:\/\/www.uni.lu\/snt-fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"contentUrl\":\"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg\",\"width\":2560,\"height\":2560,\"caption\":\"SnT - Universit\u00e9 du Luxembourg I Uni.lu\"},\"image\":{\"@id\":\"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/school\/snt-lu\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PhD Defense: Creating better ground truth to further understand Android malware - SnT - Universit\u00e9 du Luxembourg I Uni.lu","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/","og_locale":"fr_FR","og_type":"article","og_title":"PhD Defense: Creating better ground truth to further understand Android malware","og_description":"Members of the defense committee:Dr Jacques Klein, University of Luxembourg, ChairmanA-prof. Dr Jean-Fran\u00e7ois Lalande, Centrale Sup\u00e9lec, Deputy ChairmanProf. Dr Yves Le Traon, University of Luxembourg, \u00a0MemberDr Tegawend\u00e9 F. Bissyand\u00e9, University of Luxembourg, MemberDr Damien Octeau, Google Inc, Member","og_url":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/","og_site_name":"SnT FR","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/","url":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/","name":"PhD Defense: Creating better ground truth to further understand Android malware - SnT - Universit\u00e9 du Luxembourg I Uni.lu","isPartOf":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2019\/06\/phd_defense_creating_better_ground_truth_to_further_understand_android_malware-scaled.jpg","datePublished":"2019-06-24T11:52:48+00:00","dateModified":"2019-06-24T11:52:48+00:00","breadcrumb":{"@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#primaryimage","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2019\/06\/phd_defense_creating_better_ground_truth_to_further_understand_android_malware-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2019\/06\/phd_defense_creating_better_ground_truth_to_further_understand_android_malware-scaled.jpg","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.uni.lu\/snt-fr\/events\/phd-defense-creating-better-ground-truth-to-further-understand-android-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.uni.lu\/fr"},{"@type":"ListItem","position":2,"name":"Interdisciplinary Centre for Security, Reliability and Trust (SnT)","item":"https:\/\/www.uni.lu\/snt-fr\/"},{"@type":"ListItem","position":3,"name":"Events","item":"https:\/\/www.uni.lu\/snt-fr\/events\/"},{"@type":"ListItem","position":4,"name":"PhD Defense: Creating better ground truth to further understand Android malware"}]},{"@type":"WebSite","@id":"https:\/\/www.uni.lu\/snt-fr\/#website","url":"https:\/\/www.uni.lu\/snt-fr\/","name":"SnT","description":"Interdisciplinary Centre for Security, Reliability and Trust I Uni.lu","publisher":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#organization"},"alternateName":"Interdisciplinary Centre for Security, Reliability and Trust I Universit\u00e9 du Luxembourg","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.uni.lu\/snt-fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.uni.lu\/snt-fr\/#organization","name":"SnT - Universit\u00e9 du Luxembourg I Uni.lu","alternateName":"Interdisciplinary Centre for Security, Reliability and Trust","url":"https:\/\/www.uni.lu\/snt-fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","contentUrl":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/13\/2026\/03\/03112647\/SNT_SM-Profile_1600x1600px-scaled.jpg","width":2560,"height":2560,"caption":"SnT - Universit\u00e9 du Luxembourg I Uni.lu"},"image":{"@id":"https:\/\/www.uni.lu\/snt-fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/school\/snt-lu\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events\/809"}],"collection":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/types\/events"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/comments?post=809"}],"version-history":[{"count":0,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events\/809\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media\/810"}],"wp:attachment":[{"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/media?parent=809"}],"wp:term":[{"taxonomy":"events-topic","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events-topic?post=809"},{"taxonomy":"events-type","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/events-type?post=809"},{"taxonomy":"organisation","embeddable":true,"href":"https:\/\/www.uni.lu\/snt-fr\/wp-json\/wp\/v2\/organisation?post=809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}