2016 4th International Symposium on Digital Forensic and Security (ISDFS) 2016
DOI: 10.1109/isdfs.2016.7473512
|View full text |Cite
|
Sign up to set email alerts
|

Android malware analysis approach based on control flow graphs and machine learning algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 20 publications
0
13
0
1
Order By: Relevance
“…Naive Bayes and KNN machine learning algorithms were used in this study to classify permissions [23]. Atici et al developed a static system based on machine learning algorithms and control flow graphs of Dalvik byte codes for Android malware analysis [24]. In this study, grammatical expressions consisting of control flow graphs of Android malicious software were used as an input vector [24].…”
Section: Static Analysis Methodsmentioning
confidence: 99%
“…Naive Bayes and KNN machine learning algorithms were used in this study to classify permissions [23]. Atici et al developed a static system based on machine learning algorithms and control flow graphs of Dalvik byte codes for Android malware analysis [24]. In this study, grammatical expressions consisting of control flow graphs of Android malicious software were used as an input vector [24].…”
Section: Static Analysis Methodsmentioning
confidence: 99%
“…[94], [109], [115], [119], [138], [139], [142], [144], [145], [147]- [149], [154], [163], [167], [177], [188], [193], [202], [206], [214]- [216], [218], [244], [248] Linear Model (LM)…”
Section: ) Machine Learning Models and Algorithms Used In Android Maunclassified
“…[90], [94], [102], [105], [108], [109], [119], [136], [142], [145]- [147], [149], [153], [163] [166], [173], [185], [187], [189], [190], [ 192], [195], [202], [206], [214]- [216], [219], [244], [245] K-means Simple, fast, and easy to implement.…”
Section: ) Machine Learning Models and Algorithms Used In Android Mamentioning
confidence: 99%
See 1 more Smart Citation
“…The detection and analysis model of malicious code consists of two pieces: feature extraction and classification. The current feature extraction method is usually divided into serval types: static analysis [5], [6], dynamic analysis [7], [8], dynamic and static fused analysis [9]- [11], the graphs-based approach [12]- [14] et.…”
Section: Related Workmentioning
confidence: 99%