2016 IEEE Security and Privacy Workshops (SPW) 2016
DOI: 10.1109/spw.2016.25
|View full text |Cite
|
Sign up to set email alerts
|

DroidScribe: Classifying Android Malware Based on Runtime Behavior

Abstract: If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
75
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 130 publications
(75 citation statements)
references
References 23 publications
0
75
0
Order By: Relevance
“…Reina et al [20] implemented CopperDroid, a framework to execute Android apps and collect information about system calls. DroidScribe [5] uses CopperDroid as building block to execute Android apps and trace performed system calls. DroidScribe is the most notable work on Android malware family classification, purely based on dynamic analysis and machine learning, that shares most similarities with our objectives.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Reina et al [20] implemented CopperDroid, a framework to execute Android apps and collect information about system calls. DroidScribe [5] uses CopperDroid as building block to execute Android apps and trace performed system calls. DroidScribe is the most notable work on Android malware family classification, purely based on dynamic analysis and machine learning, that shares most similarities with our objectives.…”
Section: Related Workmentioning
confidence: 99%
“…It is a public collection of malware samples that can be used for research purposes, that contains 5,560 malicious applications from 179 different families. The Drebin dataset has been widely employed in the related literature [8,3,5,11,22]. Since we compare our solution to DroidScribe, in our experiments we selected the same families as DroidScribe.…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, Symantec reports [1] discovering 430 million new malware in 2015 which is a 36% increase over 2014. Also their capabilities have grown from simple phone cloning, sending premium-rated SMS to complex botnets, cryptolocker and ransomware [29]- [32]. Besides this, attackers continuously enhance the sophistication of malware to evade novel detection techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Machine Learning based malware detection. For over a decade, Machine Learning (ML) techniques have been predominantly used to perform malware detection in various platforms (such as Windows and Android) [12]- [17,21,29]- [32,39,50]. This is because, ML methods automatically learn the characteristics that distinguish malicious behavior, when trained using a collection of malware and benign samples making them amenable for automated detection.…”
Section: Introductionmentioning
confidence: 99%