Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy 2017
DOI: 10.1145/3029806.3029825
|View full text |Cite
|
Sign up to set email alerts
|

DroidSieve

Abstract: If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 156 publications
(33 citation statements)
references
References 34 publications
0
28
0
Order By: Relevance
“…L1-Regularized Linear Regression was the most robust method, and semanticsbased features such as "reachables," "happen-befores," and "unwanted behaviors," improved the robustness of malware classifiers. DroidSieve [20] was a fast, scalable, and accurate system for Android malware detection and family identification. A novel set of features for static detection comprises embedded assets and native code.…”
Section: Related Studiesmentioning
confidence: 99%
“…L1-Regularized Linear Regression was the most robust method, and semanticsbased features such as "reachables," "happen-befores," and "unwanted behaviors," improved the robustness of malware classifiers. DroidSieve [20] was a fast, scalable, and accurate system for Android malware detection and family identification. A novel set of features for static detection comprises embedded assets and native code.…”
Section: Related Studiesmentioning
confidence: 99%
“…Since this process is repeated ten times, the whole dataset is used for both training and testing with ensuring that all samples are used once for validation [52]. The metrics that are used for the evaluation of each algorithm are precision, recall, F-measure, and MCC because of they are commonly used evaluation metrics by the related work [2,10,19,22,36,46,52,74,80,83,85,[87][88]. As the evaluation result of the proposed static analysis approach when it is utilized with a wide range of algorithms is listed in Table 4, the precision, recall, and F-measure of the proposed static analysis approach are calculated as high as 0.987 when the system is utilized with the RandomForest algorithm and the number of decision trees is set to 1,000.…”
Section: Evaluation Of Machine Learning Algorithmsmentioning
confidence: 99%
“…to characterize malicious applications; Maldetect [12] extracts Dalvik instructions from dex files and simplify them by symbolizing opcode. Then, N-gram encoding of the instruction sequence is used as the input feature of the classification; DroidSieve [13] extracts massive features centered on resources and semantics, and sorts the features to find the core features; FrequenSel [14]proposes a feature selection algorithm based on the frequency difference between the malicious application and benign application; HinDroid [15] extracts the API to construct a structured heterogeneous information network and characterized the relationship between APIs. The depth analysis and characterization of the extracted features make the classification better than the traditional detection methods.…”
Section: Feature Representation On Android Malware Detectionmentioning
confidence: 99%