Proceedings of the 16th International Joint Conference on E-Business and Telecommunications 2019
DOI: 10.5220/0007834602110219
|View full text |Cite
|
Sign up to set email alerts
|

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

Abstract: With the number of new mobile malware instances increasing by over 50% annually since 2012 [25], malware embedding in mobile apps is arguably one of the most serious security issues mobile platforms are exposed to. While obfuscation techniques are successfully used to protect the intellectual property of apps' developers, they are unfortunately also often used by cybercriminals to hide malicious content inside mobile apps and to deceive malware detection tools. As a consequence, most of mobile malware detectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(26 citation statements)
references
References 20 publications
0
26
0
Order By: Relevance
“…In this way an automatic matching of the calls is avoided. A method call is converted to a call which is then invoked to the original call [25]. (vi) dynamic loading technique, malware externally loads data and/or code dynamically, from an external server at startup time.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…In this way an automatic matching of the calls is avoided. A method call is converted to a call which is then invoked to the original call [25]. (vi) dynamic loading technique, malware externally loads data and/or code dynamically, from an external server at startup time.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…The API calls can be extracted at various granularity levels such as method, class, package, and family. Since there are millions of unique methods in Android, some approaches [19,21,30] that are based on the use or the frequency of API calls have proposed to abstract API calls at class, package, and/or family levels. This reduced the number of features significantly and yet produced comparable or even better results [19,21,30].…”
Section: Introductionmentioning
confidence: 99%
“…To extract these features, in general two types of techniques are used -static analysis [5,9,19,21,30,46] and dynamic analysis [15,41]. For instance, Drebin [5] extracts permissions and API calls by scanning manifest files and disassembled code.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations