The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1007/s10586-021-03490-2
|View full text |Cite
|
Sign up to set email alerts
|

A federated approach to Android malware classification through Perm-Maps

Abstract: In the last decades, mobile-based apps have been increasingly used in several application fields for many purposes involving a high number of human activities. Unfortunately, in addition to this, the number of cyber-attacks related to mobile platforms is increasing day-by-day. However, although advances in Artificial Intelligence science have allowed addressing many aspects of the problem, malware classification tasks are still challenging. For this reason, the following paper aims to propose new special featu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 31 publications
0
15
0
Order By: Relevance
“…Among the dynamic and static features that can be extracted from malware, this article uses static features that include permission, API, and intent as follows like 36‐40 : Permission : The application‐related information of the android app (apk) are the main features of this applications and named permissions. The number of features of this type in each data set is presented in Table 2.…”
Section: Performance Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Among the dynamic and static features that can be extracted from malware, this article uses static features that include permission, API, and intent as follows like 36‐40 : Permission : The application‐related information of the android app (apk) are the main features of this applications and named permissions. The number of features of this type in each data set is presented in Table 2.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…• Genome dataset: The dataset was gathered by analysts in ASF of USA and includes 1200 malware instances. 35 Among the dynamic and static features that can be extracted from malware, this article uses static features that include permission, API, and intent as follows like [36][37][38][39][40] :…”
Section: Datasetsmentioning
confidence: 99%
“…Additionally [ 36 ], combined Opcodes, API packages, and API functions to construct RGB images and then use CNN for classification. [ 37 ] mapped permissions to severity levels [ 38 ]to create images to be fed to the CNN model for malware classification. Other methods such as [ 39 ] used network interactions as features to be converted to images to be input for CNN.…”
Section: Related Workmentioning
confidence: 99%
“…Some of them used DREBIN alone, such as [ 31 , 36 ], and some of them used only AMD, such as [ 39 ]. However, most of them used a combination of both [ 32 , 33 , 35 , 37 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation