Computer Science &Amp; Information Technology (CS &Amp; IT) 2018
DOI: 10.5121/csit.2018.81709
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection Using Machine Learning and Reverse Engineering

Abstract: This paper is focused on the issue of malware detection for Android mobile system by Reverse Engineering of java code. The characteristics of malicious software were identified based on a collected set of applications. Total number of 1958 applications where tested (including 996 malware apps). A unique set of features was chosen. Five classification algorithms (Random Forest, SVM, K-NN, Nave Bayes, Logistic Regression) and three attribute selection algorithms were examined in order to choose those that would … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…The highest accuracy achieved is 89%. Michal et al [11] use reverse engineering and applied three attribute selection algorithms and five classification algorithm. The result of naive Bayes and random forest comes out as the best.…”
Section: Related Workmentioning
confidence: 99%
“…The highest accuracy achieved is 89%. Michal et al [11] use reverse engineering and applied three attribute selection algorithms and five classification algorithm. The result of naive Bayes and random forest comes out as the best.…”
Section: Related Workmentioning
confidence: 99%
“…During first research by [18] use machine learning and reverse engineering technique to detect the android malware detection. The authors focused on static approach based on an automatic analysis of decompiled mobile application codes.…”
Section: Related Workmentioning
confidence: 99%
“…While a customer wishes to acquire any app through the Google-based Play Store, the android app will be initially retrieved, and afterward, the customer is requested to apply it following agreeing on all rights. A person could indeed install any app unless they agree to all of the designer's authorization [21]- [23]. Hackers frequently request authorization to examine a user's webcam, voice, texts, and emails, as well as other personal data.…”
Section: Introductionmentioning
confidence: 99%