2016
DOI: 10.5121/ijcacs.2016.1105
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Analysis: A Survey Paper

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 1 publication
0
2
0
1
Order By: Relevance
“…Note that we have removed some application files from which any manifest file or permission information could not be extracted in decompilation process. This is because the reverse engineering tool 6 we used fails in some cases where it may require to find and install mobile OS specific framework files in order to properly decode application program files 7 . The number of samples before and after the decompressing in our selected datasets are given in Table 3.…”
Section: Performance Evaluation 41 Datasetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that we have removed some application files from which any manifest file or permission information could not be extracted in decompilation process. This is because the reverse engineering tool 6 we used fails in some cases where it may require to find and install mobile OS specific framework files in order to properly decode application program files 7 . The number of samples before and after the decompressing in our selected datasets are given in Table 3.…”
Section: Performance Evaluation 41 Datasetsmentioning
confidence: 99%
“…The main difference between the static and dynamic approaches is the necessity of running application on the device [3,4,12,42]. The hybrid analysis is a combination of static and dynamic methods, and it creates a framework to perform both of the analyses [2,7,31,49]. In hybrid approach, the static analysis is performed at first without executing the application.…”
Section: Introductionmentioning
confidence: 99%
“…Oleh beberapa pengembang, malware dirancang untuk melakukan kerusakan pada suatu sistem yang diinfeksi, aktivitas yang dilakukan diantaranya menggangu kinerja komputer, sistem operasi, mencuri data atau informasi rahasia secara ilegal [7] [8] [9]. Sehingga dengan begitu dibutuhkan adanya sistem yang dapat mendeteksi atau pun mencegah serangan malware [10].…”
Section: Pendahuluanunclassified