2014
DOI: 10.7763/ijcce.2014.v3.310
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malicious Android Mobile Applications Based on Aggregated System Call Events

Abstract: Abstract-The diverse types of mobile applications are used regardless of time and place, as a number of Android mobile device users have been recently increased. However, the breach of privacy through illegal leakage of personal information and financial information inside mobile devices has occurred without users' notices, as the malicious mobile application is relatively increasing In order to reduce the damage caused by the malicious Android applications, the efficient detection mechanism should be develope… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In a similar way, the 2013 study by Sanz et al [198] trained machine learning classifiers to separate known malware and benign apps mined from Google Play. The 2014 study on identifying malicious apps using system call events, by Ham and Lee [90], also used apps from the Google Play Games category as a benign set, against which to compare.…”
Section: Malwarementioning
confidence: 99%
“…In a similar way, the 2013 study by Sanz et al [198] trained machine learning classifiers to separate known malware and benign apps mined from Google Play. The 2014 study on identifying malicious apps using system call events, by Ham and Lee [90], also used apps from the Google Play Games category as a benign set, against which to compare.…”
Section: Malwarementioning
confidence: 99%
“…Dynamic analysis-based malware detection approaches have an advantage over static analysis-based approaches in analyzing concrete behaviors of malware [5,12,14,22,26,27,32,36,67,70,73,74,81,83,87,90]. Also, they have another advantage of analyzing malware equipped with anti-analysis mechanisms such as obfuscation.…”
Section: Detecting Android Malwarementioning
confidence: 99%
“…However, their critical limitation is that they cannot detect unknown malware because they rely on signatures of known malicious applications [66]. Therefore, the research community have been focusing on developing malware detection approaches by using a machine learning or deep learning algorithm with various features for protecting users from emerging malware [2,5,7,10,12,[14][15][16][18][19][20][21][22][23]26,27,[30][31][32][33][34][36][37][38][39][40][41][42][45][46][47][48][49][50][51]54,58,[61][62][63][64]66,67,70,[72][73][74][76]…”
Section: Introductionmentioning
confidence: 99%
“…There are different approaches for Android malapp detection by analyzing apps' API. Some studies [3], [14], [19], [35], [42], [51], [55], [66], [67], [83], [96], [150], [194], [197], [198], [204], [230], [231], [233] extracted APIs as well as some other features and utilized machine learning to detect malapps. Some studies employed the APIs under certain conditions.…”
Section: ) Apimentioning
confidence: 99%