2019
DOI: 10.1109/access.2019.2946392
|View full text |Cite
|
Sign up to set email alerts
|

A3CM: Automatic Capability Annotation for Android Malware

Abstract: Android malware poses serious security and privacy threats to the mobile users. Traditional malware detection and family classification technologies are becoming less effective due to the rapid evolution of the malware landscape, with the emerging of so-called zero-day-family malware families. To address this issue, our paper presents a novel research problem on automatically identifying the security/privacyrelated capabilities of any detected malware, which we refer to as Malware Capability Annotation (MCA). … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 38 publications
(39 citation statements)
references
References 49 publications
0
39
0
Order By: Relevance
“…In addition, other malware use an obfuscation technique or encrypted methods which cannot be read or decrypted unless the app is executed. A set of papers [28][29][30][31][32][33][34][35][36][37][38][39]42,[46][47][48]50,52,53,[55][56][57]59,62,63,[65][66][67] used static analysis. Details on the static features used by the papers were discussed in Section 4, Features.…”
Section: Static Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…In addition, other malware use an obfuscation technique or encrypted methods which cannot be read or decrypted unless the app is executed. A set of papers [28][29][30][31][32][33][34][35][36][37][38][39]42,[46][47][48]50,52,53,[55][56][57]59,62,63,[65][66][67] used static analysis. Details on the static features used by the papers were discussed in Section 4, Features.…”
Section: Static Analysismentioning
confidence: 99%
“…The dynamic and static features are combined and fed to machine learning algorithms, such as Randomforest and KNN for classification. In [29], the authors apply Linear SVM, DT, and DL algorithms. Fene et al [60] utilize the SVM algorithm.…”
Section: Model-basedmentioning
confidence: 99%
See 2 more Smart Citations
“…In the case of malware detection [18], [19], [20], [21] and binary code analysis [22], [23] relevant studies have been actively conducted. However, anti-reversing techniques have not attracted special interest from researchers except for specific topics such as code virtualization [24], [25].…”
Section: Related Workmentioning
confidence: 99%