2019 IEEE Symposium on Computers and Communications (ISCC) 2019
DOI: 10.1109/iscc47284.2019.8969656
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Family Classification Based on Sensitive Opcode Sequence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…In addition, other malware use an obfuscation technique or encrypted methods which cannot be read or decrypted unless the app is executed. A set of papers [28][29][30][31][32][33][34][35][36][37][38][39]42,[46][47][48]50,52,53,[55][56][57]59,62,63,[65][66][67] used static analysis. Details on the static features used by the papers were discussed in Section 4, Features.…”
Section: Static Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…In addition, other malware use an obfuscation technique or encrypted methods which cannot be read or decrypted unless the app is executed. A set of papers [28][29][30][31][32][33][34][35][36][37][38][39]42,[46][47][48]50,52,53,[55][56][57]59,62,63,[65][66][67] used static analysis. Details on the static features used by the papers were discussed in Section 4, Features.…”
Section: Static Analysismentioning
confidence: 99%
“…In [66], the authors use a Nearest Neighbor classifier (NN) to classify malware into families. In [35], the authors preprocess the data and extract the sensitive opcode sequence. For the minor families, they use the oversampling technique to overcome this issue.…”
Section: Model-basedmentioning
confidence: 99%
See 3 more Smart Citations