2021
DOI: 10.1155/2021/5538841
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection via Graph Representation Learning

Abstract: With the widespread usage of Android smartphones in our daily lives, the Android platform has become an attractive target for malware authors. There is an urgent need for developing an automatic malware detection approach to prevent the spread of malware. The low code coverage and poor efficiency of the dynamic analysis limit the large-scale deployment of malware detection methods based on dynamic features. Therefore, researchers have proposed a plethora of detection approaches based on abundant static feature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 39 publications
(57 reference statements)
0
5
0
Order By: Relevance
“…Most existing approaches often rely on the contrastive method, such as SMICLR [ 35 ], DVMP [ 21 ] and MOCO [ 24 ], which focus on the same two modalities as we do but they neglect the fine-grained interactions across different modalities. A concurrent work, UniMAP [ 36 ], is a generative pre-training based on mask reconstruction, but it only performs simple mask reconstruction without a specific design of masking strategy, so it still cannot fully leverage the complementary information interactions. We introduce a non-overlapping masking strategy to force cross-modality information interaction, thereby having a greater advantage.…”
Section: Related Workmentioning
confidence: 99%
“…Most existing approaches often rely on the contrastive method, such as SMICLR [ 35 ], DVMP [ 21 ] and MOCO [ 24 ], which focus on the same two modalities as we do but they neglect the fine-grained interactions across different modalities. A concurrent work, UniMAP [ 36 ], is a generative pre-training based on mask reconstruction, but it only performs simple mask reconstruction without a specific design of masking strategy, so it still cannot fully leverage the complementary information interactions. We introduce a non-overlapping masking strategy to force cross-modality information interaction, thereby having a greater advantage.…”
Section: Related Workmentioning
confidence: 99%
“…The authors suggest using Word2Vec and GNN algorithms to extract ultrafunction semantic and interfunction structure information automatically for efficient malware identification. [24] The research recommends combining FT and SigPID into DREBIN to enhance the efficiency of running time and the accuracy of malware detection. Future research will examine this integration.…”
Section: Dataset Names Behavioral Features Machine Learning Deep Lear...mentioning
confidence: 99%
“…Using functions including API calls as graph node is more flexible. Cai et al [33] and Feng et al [34] both convert the function nodes in FCG into vector form. The former is based on word embedding, and the latter one extracts internal attributes of function as features.…”
Section: Graph Based Malware Detectionmentioning
confidence: 99%