2013
DOI: 10.2991/ccis-13.2013.22
|View full text |Cite
|
Sign up to set email alerts
|

A3: Automatic Analysis of Android Malware

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…It used machine-learning methods on feature sets to detect malicious applications. A3 [20] is another system that mentioned Intent as one of three extracted features. It utilized heuristic algorithm for detection.…”
Section: Related Workmentioning
confidence: 99%
“…It used machine-learning methods on feature sets to detect malicious applications. A3 [20] is another system that mentioned Intent as one of three extracted features. It utilized heuristic algorithm for detection.…”
Section: Related Workmentioning
confidence: 99%
“…Advertisement libraries. Provided that most Android applications are available for free download, Android developers need to include advertisement libraries (ad libraries) in Deshotels, Notani & Lakhotia (2014b); Wu et al (2012); Faruki et al (2013); Luoshi et al (2013) aapt Android ( 2013); Sanz et al (2013) androguard Desnos (2012a); Suarez-Tangil et al (2014); Sahs & Khan (2012);Aafer, Du & Yin (2013); Junaid, Liu & Kung (2016a) baksmali Anonymous (2019b); Apvrille & Strazzere (2012); Huang, Tsai & Hsu (2012); Grace et al (2012b); Zhou et al (2013); Zhou et al (2012); Grace et al (2012a) dex2jar Anonymous (2019d); Huang et al (2014a); Sheen, Anitha & Natarajan (2015); Lee & Jin (2013); Luoshi et al (2013) jadx Skylot (2015); Firdaus & Anuar (2015) dedexer Anonymous (0000b)…”
Section: Featuresmentioning
confidence: 99%
“…The examples of sensitive URLs include the Android Market on Google Play, Gmail, Google calendar, Google documents, and XML schemas. These features were used in Luoshi et al (2013) Code-based. Code-based or code structure comprises a line or set of programming language codes in an application.…”
Section: (D) Hardware Componentmentioning
confidence: 99%
See 1 more Smart Citation
“…Malware authors make use of network addresses to build communication with command and control (C&C) worker to send the client's classified information. Analysts discovered IP addresses as one of the key static components for investigation [91][92][93].…”
Section: Complexitymentioning
confidence: 99%