2019
DOI: 10.1007/978-3-030-36056-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Android Ransomware Detection Based on Dynamic Obtained Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…Similarly, Abdullah et al collect system calls for each executed Android application [18]. VirusTotal is used to download malicious applications.…”
Section: Api Callsmentioning
confidence: 99%
See 2 more Smart Citations
“…Similarly, Abdullah et al collect system calls for each executed Android application [18]. VirusTotal is used to download malicious applications.…”
Section: Api Callsmentioning
confidence: 99%
“…It is based on the sequence of API calls Manuscript submitted to ACM Articles Type Approaches Tested Detection/Protection Mechanism Static Dynamic Solution [39] API Calls ✓ X ✓ Random forest applied to the occurrences of system API packages in the Android apps to classify the executables as ransomware, malware, or trusted. [18] API Calls X ✓ ✓ Random forest, J48, and Naive Bayes are applied to fiftytwo collected system calls to detect ransomware samples. [32] Multiple IOC ✓ ✓ ✓ Applying ML on static (threatening texts, logos and API methods found in the APK) and dynamic features (sequence of API calls) to detect Android ransomware.…”
Section: Multiple Ioc (Indicators Of Compromise)mentioning
confidence: 99%
See 1 more Smart Citation
“…The last aspect is a major challenge since it preserves confidentiality, integrity and availability of user data. On Android, most of the approaches use static analysis relying on static features related to applications [7][8][9][10][11], dynamic analysis relying on features observed during their execution [12][13][14] and hybrid analysis combining the both [15][16][17]. Despite Google Play Protect provided by Google, to filter threats, there are still malicious applications carefully designed by bad people to have an impact on the security and privacy of users [8,18].…”
Section: Introductionmentioning
confidence: 99%
“…The last aspect is a major challenge since it preserves confidentiality, integrity and availability of user data. On Android, most of the approaches static analysis relying static features related to applications [4][5][6][7][8], dynamic analysis relying on features observed during their execution [9][10][11] and hybrid analysis combining the both [12][13][14]. Despite Google Play Protect provided by Google, to filter threats, there are still malicious applications carefully designed by bad people to have an impact on the security and privacy of users [5,15].…”
Section: Introductionmentioning
confidence: 99%