2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS) 2016
DOI: 10.1109/ccis.2016.7790261
|View full text |Cite
|
Sign up to set email alerts
|

An Android malware detection method based on AndroidManifest file

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 5 publications
0
13
0
2
Order By: Relevance
“…[157] refers to the experience of Arp et al [88] in the development of Drebin. [148] Information gain (Mutual information), Chi-square statistics (CS), Fisher score (FS) [149] Information gain (Mutual information), Dependence measure [102] Information gain (Mutual information), Dependence measure [150] TF-IDF, cosine similarity [151] Sequential forward selection (SFS) [107] Fisher score (FS) [152] Dependence measure [153] Pearson correlation coefficient [154] Chi-square statistics (CS) [155] Relief algorithm [156] Genetic search (GS) [157] The selection of static features refers to the experience of Arp et al in the Drebin project.…”
Section: Data Transformationmentioning
confidence: 99%
“…[157] refers to the experience of Arp et al [88] in the development of Drebin. [148] Information gain (Mutual information), Chi-square statistics (CS), Fisher score (FS) [149] Information gain (Mutual information), Dependence measure [102] Information gain (Mutual information), Dependence measure [150] TF-IDF, cosine similarity [151] Sequential forward selection (SFS) [107] Fisher score (FS) [152] Dependence measure [153] Pearson correlation coefficient [154] Chi-square statistics (CS) [155] Relief algorithm [156] Genetic search (GS) [157] The selection of static features refers to the experience of Arp et al in the Drebin project.…”
Section: Data Transformationmentioning
confidence: 99%
“…The study, "Mobil Bankacılıkta Güvenlik Sorunlarının Analizi" [15] mobile application security methods are described and presented. In the studies, "Android Kötücül Yazılım Tespit Sistemleri İncelemesi" [16], "An Android Malware Detection Method Based on AndroidManifest File" [17] "Permission-Based Android Malware Detection" [18] and "MAMA: Manifest Analysis for Malware Detection in Android" [19], AndroidManifest.xml file has been seen that how important it is for application security. As seen in the literature, if there is not enough security on mobile devices, personal information of the users can be stolen, their privacy can be violated and the applications of the users can be disabled.…”
Section: Introductionmentioning
confidence: 99%
“…In order to address this question, the previous researchers find that there are two techniques for the unknown Android malware analysis: static analysis and dynamic analysis [2]. Static analysis, occurs before the Android application is installed, is a technique based on checking the contents of the APK [3] by means of reverse engineering.…”
Section: Introductionmentioning
confidence: 99%