2016
DOI: 10.1109/tst.2016.7399288
|View full text |Cite
|
Sign up to set email alerts
|

Droiddetector: android malware characterization and detection using deep learning

Abstract: Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile operating system since 2012. However, owing to the open nature of Android, countless malwares are hidden in a large number of benign apps in Android markets that seriously threaten Android security. Deep learning is a new area of machine learning research that has gained increasing attention in artificial intelligence. In this study, we propose to associate the features from the static anal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
158
1
6

Year Published

2017
2017
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 383 publications
(172 citation statements)
references
References 24 publications
1
158
1
6
Order By: Relevance
“…Droid-Sec Yuan et al (2014) is one of the first frameworks that applied deep learning to classify Android malware, achieving 96.5% accuracy using 200 features extracted by means of a hybrid (static + dynamic) approach evaluated on 250 clean and 250 malware Android apps. Droid-Sec was a preliminary work for DroidDetector Yuan et al (2016) , where the authors increased the number of the analysed apps to 20,0 0 0 clean and 1760 malware and achieved 96.76% accuracy. Hou et al (2016) proposed Deep4MalDroid , an automatic Android malware detection system, which will dynamically extract Linux kernel system calls using Genymotion emulator.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Droid-Sec Yuan et al (2014) is one of the first frameworks that applied deep learning to classify Android malware, achieving 96.5% accuracy using 200 features extracted by means of a hybrid (static + dynamic) approach evaluated on 250 clean and 250 malware Android apps. Droid-Sec was a preliminary work for DroidDetector Yuan et al (2016) , where the authors increased the number of the analysed apps to 20,0 0 0 clean and 1760 malware and achieved 96.76% accuracy. Hou et al (2016) proposed Deep4MalDroid , an automatic Android malware detection system, which will dynamically extract Linux kernel system calls using Genymotion emulator.…”
Section: Related Workmentioning
confidence: 99%
“…2 , we can conclude that DL-Droid with stateful input generation (our initially proposed approach) achieves the best detection accuracy. ( Yuan et al, 2016 ) in all other metrics, while utilizing more samples for the experiments. DL-Droid also outperforms Maldozer ( Karbab et al, 2017 ), Deep4MalDroid ( Hou et al, 2016 ), AutoDroid ( Hou et al, 2017 ) and the CNN approach presented in ( McLaughlin et al, 2017 ).…”
Section: Comparison Of the Performance Of The Deep Learning Classifiementioning
confidence: 99%
“…AutoMal additionally empowers unsupervised learning, by executing various bunching calculations for tests gathering. An assessment of both AutoMal and MaLabel in view of medium-scale [40] presented a deep learning method to connect the components from the static investigation with elements from the dynamic investigation of Android applications. In addition, they actualized an Android malware detection engine based on the deep-learning method (DroidDetector) that can consequently distinguish whether a file has a malicious behavior or not.…”
Section: Review Of the Selected Behavior-based Approachesmentioning
confidence: 99%
“…Then, it performed dynamic analysis to log actions especially those based on native API calls. DroidDetector [15] extracted 192 features from both static and dynamic analyses including required permissions, sensitive API, and dynamic behaviors emulated using DroidBox and then detected malware using a DNN-based deep learning model. Marvin [16] collected requested permissions, components, SDK version, and a complete list of available Java methods during static analysis.…”
Section: Detection Using Hybridmentioning
confidence: 99%