2016
DOI: 10.1007/978-3-319-51966-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Andrana: Quick and Accurate Malware Detection for Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…In this aforementioned perspective, the last decade, strong efforts have been achieved to generalize the problem, and to develop new approaches based on machine learning (ML) [11,16,17,39,50] (see Fig. 1, ❹).…”
Section: Emergence Of Machine Learning Algorithms To Detect Android Malwarementioning
confidence: 99%
See 1 more Smart Citation
“…In this aforementioned perspective, the last decade, strong efforts have been achieved to generalize the problem, and to develop new approaches based on machine learning (ML) [11,16,17,39,50] (see Fig. 1, ❹).…”
Section: Emergence Of Machine Learning Algorithms To Detect Android Malwarementioning
confidence: 99%
“…As far as our knowledge, no attempts have been done towards improving Android malware detection systems based on machine learning algorithms. Whether one [11,16] or several algorithms [17,39,50] are evaluated, the evaluations are always carried out empirically, implying a manual process with few and/or default hyper-parameter combinations. Testing various algorithms along with a large set of hyper-parameters is a daunting task that costs a lot both in terms of time and resources [36].…”
Section: Introductionmentioning
confidence: 99%
“…Several tools leverages machine learning techniques and static analysis to categorize Android applications (written in Java) as either malicious or benign. The tool ANDRANA [3] relies on static analysis of the applications's code to create a vector of features for each application. Classification is then performed to determine if the observed features a typical to those previously observed in malware.…”
Section: Related Workmentioning
confidence: 99%
“…The end result of this first part of the chain is that processors 3 and 9 synchronously output method call events; events at matching positions in the streams represent the caller of a method (9) and the method being called (3). From this point on, the rest of the processing is straightforward.…”
Section: Security Propertiesmentioning
confidence: 99%