2019
DOI: 10.48550/arxiv.1905.09136
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

DaDiDroid: An Obfuscation Resilient Tool for Detecting Android Malware via Weighted Directed Call Graph Modelling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Furthermore, changing the order of API calls of the app may damage the malicious activity of the app. However, several evasion attacks manipulate the flow of the app and succeed in deceiving this kind of detection system, such as [51], [63], [58], [64], [65].…”
Section: A Android Malware Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, changing the order of API calls of the app may damage the malicious activity of the app. However, several evasion attacks manipulate the flow of the app and succeed in deceiving this kind of detection system, such as [51], [63], [58], [64], [65].…”
Section: A Android Malware Detection Systemsmentioning
confidence: 99%
“…Another example of concealment is packing an app inside a fellow app. DaDidroid [63] explored a similar approach as Demontis et al [35] using packing and obfuscation.…”
Section: B Problem-based Evasion Attacksmentioning
confidence: 99%
“…Furthermore, a change to the sequence of API calls of the app may damage the functionality of the malicious app, or its maliciousness. However, evasion attacks that manipulate the flow of the app such as as [30,62,86,99,128] succeed in deceiving this kind of detection systems.…”
Section: Android Malware Ml-based Detection Systemsmentioning
confidence: 99%
“…Another example of camouflage is packing an app inside another app. DaDidroid [62] used a similar approach as found in Demontis et al [32] by adding packing to the obfuscation methods. The authors wrapped the original Android malware inside another app.…”
Section: Evasion Attacks On Ml-based Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation