2020
DOI: 10.1016/j.array.2020.100022
|View full text |Cite
|
Sign up to set email alerts
|

Black box analysis of android malware detectors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…It is divided into the host application and the malicious plugins. The nine plugins the malware abuses are Online, Task, Update, File, Location, Contact, Camera, Radio, and WIFI [847]- [851].…”
Section: Spyware (Trojan Clicker)mentioning
confidence: 99%
See 2 more Smart Citations
“…It is divided into the host application and the malicious plugins. The nine plugins the malware abuses are Online, Task, Update, File, Location, Contact, Camera, Radio, and WIFI [847]- [851].…”
Section: Spyware (Trojan Clicker)mentioning
confidence: 99%
“…This package impersonates IEC in some characteristics. Once installed, it installs the spyware on the device [847], [856]. Subsequently, the collected CNN models were then tested.…”
Section: Spyware Operation-electric-powdermentioning
confidence: 99%
See 1 more Smart Citation
“…Android consumers have the power to authorize or reject applications that have been installed (Sarkar et al, 2019). There are several ways to obfuscate code in an Android world, and many off-the-shelf code obfuscators are available for that reason (Nellaivadivelu et al, 2020).…”
Section: Importance Of Android Systemsmentioning
confidence: 99%
“…[Mathews, 2019] utilized the LIME (Local Interpretable Model-Agnostic Explanations) algorithm to classify malware and provided a general explanation of explainable artificial intelligence (XAI), referencing important principles for evaluating explainability. [Nellaivadivelu et al, 2020] conducted a black-box study of the Android malware system, analyzing which features a classification model relies on for making decisions. [Fan et al, 2020] evaluated five distinct local and model-agnostic explanation approaches for Android malware analysis -LIME, Anchor, LORE (LOcal Rule-based Explanations) SHAP (Shapley Additive Explanations) , and LEMNA (Local Explanation Method using Nonlinear Approximation) [Guo et al, 2018]).…”
Section: Background and Related Workmentioning
confidence: 99%