2017 12th International Conference on Malicious and Unwanted Software (MALWARE) 2017
DOI: 10.1109/malware.2017.8323954
|View full text |Cite
|
Sign up to set email alerts
|

Android malware family classification based on resource consumption over time

Abstract: The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years. An important task of malware analysis is the classification of malware samples into known families. Static malware analysis is known to fall short against techniques that change static characteristics of the malware (e.g. code obfuscation), while dynamic analysis has proven effective against such techniques. To the best of our knowledge, the most notable work o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(39 citation statements)
references
References 19 publications
0
34
0
2
Order By: Relevance
“…Other systems include Droidcat [60], STREAM [61], Mobile-Sandbox (2014) [62], Dysign [63], Massarelli et. al [64], Alzaylaee et. al.…”
Section: Related Workmentioning
confidence: 97%
“…Other systems include Droidcat [60], STREAM [61], Mobile-Sandbox (2014) [62], Dysign [63], Massarelli et. al [64], Alzaylaee et. al.…”
Section: Related Workmentioning
confidence: 97%
“…The study described in Ref. [143] evaluates whether the application is malicious according to the resource consumption of the application at runtime, focusing on the consumption of CPU, memory, network, and other resources. Researchers in Ref.…”
Section: ) Dynamic Featuresmentioning
confidence: 99%
“…[3], [88], [100]- [103], [105], [107]- [109], [113]- [117], [119], [121], [136], [137], [139], [140], [143], [147], [151]- [153], [155], [157], [162], [166], [167], [169], [175]- [177], [179]- [181], [183], [187], [189], [190], [192], [193], [195], [202], [207], [212]- [216] K-Nearest Neighbors (KNN)…”
Section: ) Machine Learning Models and Algorithms Used In Android Mamentioning
confidence: 99%
“…There exist several approaches for automatic malware classification that are based on classifiers trained with a fixed ground truth of families [3,4]. Although they are highly accurate, they fail in family identification as they can not recognize new families unless they are frequently re-trained on an updated and reliable ground truth, which is commonly not available.…”
Section: Introductionmentioning
confidence: 99%