2022
DOI: 10.36227/techrxiv.21602706.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

An ML-Based Recognizer of Exfiltration Attack over Android Platform: MLGuard

Abstract: <p>As Android smartphones continue to rise in popularity, the number of malicious programs targeting the platform has increased dramatically. Methods for efficiently detecting and preventing the spread of Android malware have become a subject of increasing urgency. The exfiltration of sensitive data from smartphones is one of the sophisticated security threats that need to be addressed. In this paper, we analyzed the 3-grams of system calls, and developed a framework for identifying malicious Android app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 24 publications
0
0
0
Order By: Relevance
“…Because of this, we describe a novel method called FeVec, which uses automated feature vector representation to identify malware samples. The FeVec method utilizes feature hashing [67] and an NLP bag of words (N-grams) [68][69][70][71] to form fixed-size embeddings from concatenated instruction sequences. This step consists of two main steps.…”
Section: Clustering Preprocessingmentioning
confidence: 99%
See 1 more Smart Citation
“…Because of this, we describe a novel method called FeVec, which uses automated feature vector representation to identify malware samples. The FeVec method utilizes feature hashing [67] and an NLP bag of words (N-grams) [68][69][70][71] to form fixed-size embeddings from concatenated instruction sequences. This step consists of two main steps.…”
Section: Clustering Preprocessingmentioning
confidence: 99%
“…Precision, accuracy, F1-score and recall are used to display the evaluation results. We evaluate the efficiency of family clustering using the coverage and homogeneity [71] measures. The generated family clusters are evaluated on their degree of purity using the homogeneity metric.…”
Section: Performance Metricsmentioning
confidence: 99%