2017
DOI: 10.1007/s10664-017-9539-8
|View full text |Cite
|
Sign up to set email alerts
|

A multi-view context-aware approach to Android malware detection and malicious code localization

Abstract: Existing Android malware detection approaches use a variety of features such as securitysensitive APIs, system calls, control-flow structures and information flows in conjunction with Machine Learning classifiers to achieve accurate detection. Each of these feature sets provides a unique semantic perspective (or view ) of apps' behaviors with inherent strengths and limitations. Meaning, some views are more amenable to detect certain attacks but may not be suitable to characterize several other attacks. Most of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
53
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(55 citation statements)
references
References 54 publications
2
53
0
Order By: Relevance
“…Secondly, we also would like to use them as different features, just like multiviews [20]. So the second mode, called the horizontal one, combines them via the matrix extension (denoted as A cfg ⊕ A dfg ).…”
Section: Graph Encodingmentioning
confidence: 99%
See 1 more Smart Citation
“…Secondly, we also would like to use them as different features, just like multiviews [20]. So the second mode, called the horizontal one, combines them via the matrix extension (denoted as A cfg ⊕ A dfg ).…”
Section: Graph Encodingmentioning
confidence: 99%
“…DroidOL [13] is an online machine learning based framework, which extracts features from inter-procedural control-flow sub-graphs. MKLDroid [20] integrates context-aware multiple views to detect Android malware, where all views are built from inter-procedural control flow graphs. However, most of these approaches only consider control flow properties, leaving data flow properties out of consideration.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, having a new literature review can be influenced on the research studies and explore some technical details in malware detection using data mining techniques. Of course, some research [13][14][15][16][17] had discussed the malware detection approaches. There are some defects in the surveyed research.…”
mentioning
confidence: 99%
“…To this end, they study the social behaviors that affect the spread of malware, model these spread behaviors with multiple epidemic models, and predict the infection time and order among markets for well-known malware families. Paper [82] proposes a unified framework that systematically integrates multiple views of apps for performing comprehensive malware detection and malicious code localisation. Based on the modularized attack features, paper [83] audits the AMTs at runtime by applying the dynamic code generation and loading techniques to produce malware.…”
Section: Related Workmentioning
confidence: 99%