2020
DOI: 10.1007/s42452-020-3132-2
|View full text |Cite
|
Sign up to set email alerts
|

Android malware detection based on image-based features and machine learning techniques

Abstract: In this paper, a malware classification model has been proposed for detecting malware samples in the Android environment. The proposed model is based on converting some files from the source of the Android applications into grayscale images. Some image-based local features and global features, including four different types of local features and three different types of global features, have been extracted from the constructed grayscale image datasets and used for training the proposed model. To the best of ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
7

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 36 publications
0
9
0
7
Order By: Relevance
“…Unver. H [13] converted the android apps into grayscale images. Local and Global features are extracted from grayscale images.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Unver. H [13] converted the android apps into grayscale images. Local and Global features are extracted from grayscale images.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[ 32 ] implemented and introduced a color visualization method on classes.dex and AndroidManifest.xml files in malware Android apps and classify the images using CNN-ResNet models. In [ 33 ] paper, classical machine algorithms such as Random Forest, K-nearest Neighbors, Decision Tree, Bagging, AdaBoost, and Gradient Boost were used for classification after constructing feature vectors from gray images, yielded from converting APK contents such as classes.dex to images. [ 34 ] proposed an approach to enhance blockchain user security by implementing RGB image visualization technique on three types of files in Android apps: classes.dex, AndroidManifest.xml, and Certificate.…”
Section: Related Workmentioning
confidence: 99%
“…Some of them used DREBIN alone, such as [ 31 , 36 ], and some of them used only AMD, such as [ 39 ]. However, most of them used a combination of both [ 32 , 33 , 35 , 37 ].…”
Section: Related Workmentioning
confidence: 99%
“…e static analysis approach can be affected by code obfuscation and code manipulation techniques [32]. Ünver and Bakour [27] proposed a framework for distinguishing between the Android applications as software or malware. Yang and Wen [33] inspected unzipped files from APK files using images patterns with the help of a random forest classifier.…”
Section: Image-basedmentioning
confidence: 99%