2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2019
DOI: 10.1109/itnec.2019.8729017
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Detection Method for Android Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…In [41], Android malware was detected by observing run-time-related events along with sensitive APIs and permissions by Zhu et al Apart from this, the authors in [42] and [43] proposed two absolutely different hybrid detection techniques by merging and combining the permissions with network traffic features. On similar lines, the authors in [44], [45], and [46] worked on malware detection by analyzing the combination of static and dynamic features.…”
Section: Hybrid Detectionmentioning
confidence: 98%
“…In [41], Android malware was detected by observing run-time-related events along with sensitive APIs and permissions by Zhu et al Apart from this, the authors in [42] and [43] proposed two absolutely different hybrid detection techniques by merging and combining the permissions with network traffic features. On similar lines, the authors in [44], [45], and [46] worked on malware detection by analyzing the combination of static and dynamic features.…”
Section: Hybrid Detectionmentioning
confidence: 98%
“…erefore, some scholars have combined static analysis and dynamic analysis to produce hybrid analysis. In [29], the authors proposed a hybrid detection method that performs dynamic detection on these suspicious applications which are detected by static detection. In [30], the authors compiled static and dynamic features from benign and malicious applications such as API call sequence, system command, manifest permission, and intent.…”
Section: Related Workmentioning
confidence: 99%
“…Fang et al [19] suggested a hybrid analysis method which performs dynamic analysis on the results of static analysis. During the static analysis phase, they decompiled the app's APK file to extract permissions from the manifest file as well as any occurrence of API features existing in smali files.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, none of them is offered as a web app and only the work in Reference [17] is open source. ML techniques are exploited in half of the works included in the Table, namely References [10,13,14,16,19]. Finally, it is worth mentioning that there exists a number of free online Android app analysis tools, including AMAaaS [21] and VirusTotal [22].…”
Section: Related Workmentioning
confidence: 99%