Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2017
DOI: 10.1109/tifs.2017.2687880
|View full text |Cite
|
Sign up to set email alerts
|

DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis

Abstract: To devise efficient approaches and tools for detecting malicious packages in the Android ecosystem, researchers are increasingly required to have a deep understanding of malware. There is thus a need to provide a framework for dissecting malware and locating malicious program fragments within app code in order to build a comprehensive dataset of malicious samples. Towards addressing this need, we propose in this work a tool-based approach called HookRanker, which provides ranked lists of potentially malicious … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 112 publications
(44 citation statements)
references
References 41 publications
0
37
0
2
Order By: Relevance
“…Wang et al [18] evaluated the usefulness of risky permissions for malware detection using SVM, Decision Trees and Random Forest. DAPASA [19] focused on detecting malware piggybacked onto benign apps by utilizing sensitive subgraphs to construct five features depicting invocation patterns. The features are fed into machine learning algorithms i.e.…”
Section: A Static Analysis With Traditional Classifiersmentioning
confidence: 99%
“…Wang et al [18] evaluated the usefulness of risky permissions for malware detection using SVM, Decision Trees and Random Forest. DAPASA [19] focused on detecting malware piggybacked onto benign apps by utilizing sensitive subgraphs to construct five features depicting invocation patterns. The features are fed into machine learning algorithms i.e.…”
Section: A Static Analysis With Traditional Classifiersmentioning
confidence: 99%
“…In this field, almost all recently proposed detectors relied on semantic features to model malware behaviours. For example, Fan et al [15] proposed DAPASA, an approach to detect Android piggybacked applications through sensitive subgraph analysis. Xu et al [46] leveraged the inter-component communication patterns to detect Android malware.…”
Section: Android Malware Detectionmentioning
confidence: 99%
“…This could be attributed to fact that this view extracts much larger number of high-quality features compared to the other two views. Owing to this well-known inference, many works in the past (e.g., [23,27,32,36,37]) have used them for a variety of tasks (incl. malware and clone detection).…”
Section: Single-vs Multi-view Profilesmentioning
confidence: 99%