2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) 2017
DOI: 10.1109/icdcs.2017.190
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection Using Complex-Flows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Unfortunately, this approach cannot detect compressed or encrypted code. • Complex-flow analysis is a new type of information flow analysis proposed by Shen et al [28], which ac- cording to the authors, can produce 86.5% detection rate. Unfortunately, their method cannot detect malicious behavior that is present in native code, which is the case for some of the latest mobile malware.…”
Section: Discussionmentioning
confidence: 84%
See 1 more Smart Citation
“…Unfortunately, this approach cannot detect compressed or encrypted code. • Complex-flow analysis is a new type of information flow analysis proposed by Shen et al [28], which ac- cording to the authors, can produce 86.5% detection rate. Unfortunately, their method cannot detect malicious behavior that is present in native code, which is the case for some of the latest mobile malware.…”
Section: Discussionmentioning
confidence: 84%
“…Shen et al [28] proposed a malware detection approach based on information flow analysis. The authors proposed complex-flow as a new representation schema for information flows.…”
Section: Anomaly-based Detectionmentioning
confidence: 99%
“…A mobile malware detection scheme that relies on information flow analysis has been suggested by Shen et al [31]. They introduced the notion of complex-flow as a new representation approach for information flows.…”
Section: Literature Surveymentioning
confidence: 99%