2019
DOI: 10.1109/tmc.2018.2861405
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection Using Complex-Flows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(30 citation statements)
references
References 43 publications
0
30
0
Order By: Relevance
“…EC2 [42] performs Android malware families prediction through static and dynamic features with the ensemble of supervised and unsupervised classifiers. e closest research studies to our work are presented by Kang et al [19,20], Shen et al [21], and Arp et al [12]. Several efforts [19][20][21] features based on expert analysis to manually extract features, and the evaluation result with the SVM classifier presents a malware detection accuracy of 94%.…”
Section: Malware Family Identificationmentioning
confidence: 80%
See 2 more Smart Citations
“…EC2 [42] performs Android malware families prediction through static and dynamic features with the ensemble of supervised and unsupervised classifiers. e closest research studies to our work are presented by Kang et al [19,20], Shen et al [21], and Arp et al [12]. Several efforts [19][20][21] features based on expert analysis to manually extract features, and the evaluation result with the SVM classifier presents a malware detection accuracy of 94%.…”
Section: Malware Family Identificationmentioning
confidence: 80%
“…e closest research studies to our work are presented by Kang et al [19,20], Shen et al [21], and Arp et al [12]. Several efforts [19][20][21] features based on expert analysis to manually extract features, and the evaluation result with the SVM classifier presents a malware detection accuracy of 94%. Compared with these approaches, we use the combination of conventional static features and n-opcode, which can specifically describe the characterization of Android applications.…”
Section: Malware Family Identificationmentioning
confidence: 80%
See 1 more Smart Citation
“…While MaMaDroid does not specifically use the n-grams, it has the same effect in capturing the order of events (here API calls). Similar is the work of Shen et al [64], where n-grams are used over data flows to identify the sub-flows order. Event ordering The basic idea of event order to characterize processes was first explored by Forrest et al in their seminal work [23].…”
Section: Related Workmentioning
confidence: 90%
“…Another example arise in the context of software classification, where the objective of the adversary is to force the machine learning algorithm to misclassify a malicious software (malware) as a benign one, for example [20], [21], [22]. In that context, there has been several works that provide involved approaches for such a task.…”
Section: Understanding the Space Of Robust Machine Learningmentioning
confidence: 99%