The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
Proceedings of the 36th International Conference on Software Engineering 2014
DOI: 10.1145/2568225.2568276
|View full text |Cite
|
Sign up to set email alerts
|

Checking app behavior against app descriptions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
223
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 344 publications
(227 citation statements)
references
References 22 publications
3
223
0
1
Order By: Relevance
“…RELATED WORK There is a large body of work demonstrating that installtime prompts fail because users do not understand or pay attention to them [17], [21], [37]. When using install-time prompts, users often do not understand which permission types correspond to which sensitive resources and are surprised by the ability of background applications to collect information [15], [20], [36].…”
Section: Introductionmentioning
confidence: 99%
“…RELATED WORK There is a large body of work demonstrating that installtime prompts fail because users do not understand or pay attention to them [17], [21], [37]. When using install-time prompts, users often do not understand which permission types correspond to which sensitive resources and are surprised by the ability of background applications to collect information [15], [20], [36].…”
Section: Introductionmentioning
confidence: 99%
“…As we will show in Table 2, a linear classifier using API calls and permissions as input features, which are the most popular and the best performing input features for Android malware detectors [5,8,10,14,22,36], performs badly on new malware instances (the testing set), although it has a very good classification performance on the validation set. In this section, we will show that unwanted behaviours improve the classification performance of new malware detection.…”
Section: Evaluation: Detecting New Malwarementioning
confidence: 99%
“…To automatically detect Android malware, machine learning methods have been applied to train malware classifiers [5,8,21,22,36]. Among them, the tool Drebin [8] extracts a broad range of features, such as permissions, components, API calls and intents, then trains an SVM classifier.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The number of topics has been selected according to the number of labels resulted from the open coding session and reported in Table 8.4. Although a near-optimal configuration of LDA could require a proper setting-e.g., through search-based optimization techniques [PDO + 13]-in this work we have set the number of topics equal to the number of expected categories, an approach already followed when LDA has been used to categorize text [GTGZ14].…”
Section: Semantic Featuresmentioning
confidence: 99%