DOI: 10.31979/etd.uzt8-w8qh
|View full text |Cite
|
Sign up to set email alerts
|

Black Box Analysis of Android Malware Detectors

Abstract: Black Box Analysis of Android Malware Detectors by Guruswamy Nellaivadivelu Code obfuscation can make it challenging to detect malware in Android devices. Malware writers obfuscate the code of their programs by employing various techniques that attempt to hide the true purpose of the program. Malware detectors can use a number of features to classify a program as a malware. If the malware detector uses a feature that is obfuscated, then the malware detector will likely fail to classify the malware as malicious… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Detecting malicious code in the system has also been a focus. Datadriven hybrid data assimilation is presented by Nellaivadivelu et al [18] as a multilayer perceptron-based approach for capturing state variables in Decision Analysis (DA) situations. For the purposes of observation, context, and analysis, this research drew on the solver package and forecast model sources based on satellites optimised for software.…”
Section: Related Workmentioning
confidence: 99%
“…Detecting malicious code in the system has also been a focus. Datadriven hybrid data assimilation is presented by Nellaivadivelu et al [18] as a multilayer perceptron-based approach for capturing state variables in Decision Analysis (DA) situations. For the purposes of observation, context, and analysis, this research drew on the solver package and forecast model sources based on satellites optimised for software.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the increasing number of malignant application in 2016, working on detection models of malwares has accelerated. The studies based on source code analysis in static analysis type [14][15][16], and Sandbox usage [17], client-server structure [18], behaviour based surveillance [19], API calls [20] monitoring researches in dynamic analysis were made. By using different approaches, it was tried to achieve more robust results and to increase the safety of mobile users.…”
Section: Related Workmentioning
confidence: 99%