2019
DOI: 10.1109/access.2019.2896003
|View full text |Cite
|
Sign up to set email alerts
|

A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms

Abstract: Android malware severely threaten system and user security in terms of privilege escalation, remote control, tariff theft, and privacy leakage. Therefore, it is of great importance and necessity to detect Android malware. In this paper, we present a combination method for Android malware detection based on the machine learning algorithm. First, we construct the control flow graph of the application to obtain API information. Based on the API information, we innovatively construct Boolean, frequency, and time-s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
83
1
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 172 publications
(94 citation statements)
references
References 35 publications
(28 reference statements)
0
83
1
1
Order By: Relevance
“…Experiments with 1700 benign applications from Xiaomi markets and 1600 malicious applications demonstrate the effectiveness of FDP, which achieves a TP rate of 94.5% and only requires 15.052 s to analyze an application on average. e main contributions of our work can be summarized as follows:…”
Section: Introductionmentioning
confidence: 94%
See 1 more Smart Citation
“…Experiments with 1700 benign applications from Xiaomi markets and 1600 malicious applications demonstrate the effectiveness of FDP, which achieves a TP rate of 94.5% and only requires 15.052 s to analyze an application on average. e main contributions of our work can be summarized as follows:…”
Section: Introductionmentioning
confidence: 94%
“…Compared with permissions as features, application programming interfaces (APIs) represent the entire picture of application behavior provided by the Android system [15]. DroidAPIMiner [16] exploits data flow analysis to extract the numbers of APIs used in malicious applications and benign applications to analyze the difference between them, which is similar to these methods in [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…However, the overhead between client and server and lack of real monitoring is a still challenging task in cloud environment. Mobile-and IoT-based detection approaches can use both static and dynamic features and improve detection rates on traditional and new generation of malware [34]. But, they have difficulties to detect complex malware and are not scalable for large bundle of apps.…”
Section: Papermentioning
confidence: 99%
“…Static analysis is an effective mechanism in any Android malware or ransomware detection system [28] and API calls feature is a key static metric that is utilized to identify malicious behaviors [29][30][31]. Therefore, this paper provides a deep analysis of API calls to investigate the extent of their influence on the accuracy of the detection process.…”
Section: Introductionmentioning
confidence: 99%