Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 2017
DOI: 10.1145/3110025.3116211
|View full text |Cite
|
Sign up to set email alerts
|

Deep Neural Networks for Automatic Android Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(24 citation statements)
references
References 19 publications
0
23
0
1
Order By: Relevance
“…( Yuan et al, 2016 ) in all other metrics, while utilizing more samples for the experiments. DL-Droid also outperforms Maldozer ( Karbab et al, 2017 ), Deep4MalDroid ( Hou et al, 2016 ), AutoDroid ( Hou et al, 2017 ) and the CNN approach presented in ( McLaughlin et al, 2017 ). It is interesting to note that, just like in Deep4MalDroid and Auto-Droid, the number of the optimum hidden layers for DL-Droid is three.…”
Section: Comparison Of the Performance Of The Deep Learning Classifiementioning
confidence: 89%
“…( Yuan et al, 2016 ) in all other metrics, while utilizing more samples for the experiments. DL-Droid also outperforms Maldozer ( Karbab et al, 2017 ), Deep4MalDroid ( Hou et al, 2016 ), AutoDroid ( Hou et al, 2017 ) and the CNN approach presented in ( McLaughlin et al, 2017 ). It is interesting to note that, just like in Deep4MalDroid and Auto-Droid, the number of the optimum hidden layers for DL-Droid is three.…”
Section: Comparison Of the Performance Of The Deep Learning Classifiementioning
confidence: 89%
“…Studies [3], [33], [46], [194] all considered restricted API calls and suspicious API calls as features to detect malapps. Instead of using API calls directly, Hou et al [82] further categorized the API calls belonging to the same method in the smali code into a block, namely API call block. Their experimental results showed that the API call block outperformed using API calls directly in Android malapp detection.…”
Section: ) Apimentioning
confidence: 99%
“…They tested the method on a recent dataset composed of 7100 real-world mobile apps, obtaining an accuracy ranging between 0.85 and 0.95. Based on the extracted system calls, Hou et al [82] constructed the weighted directed graphs and then applied a deep learning framework for newly unknown Android malapp detection. They evaluated the performance of their proposed Deep4MalDroid.…”
Section: ) System Callmentioning
confidence: 99%
“…The proposed model outperforms various traditional ML models and achieves F1 score of 95.05%. In [350], a novel feature representation and two DL based malware detectors for android systems is proposed. The detection framework uses block of API calls as features instead of simple API calls which makes it harder for the attacker to evade detection.…”
Section: ) Deep Neural Network (Dnn)mentioning
confidence: 99%