2020
DOI: 10.1109/tdsc.2017.2739145
|View full text |Cite
|
Sign up to set email alerts
|

EC2: Ensemble Clustering and Classification for Predicting Android Malware Families

Abstract: If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0
1

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 80 publications
(62 citation statements)
references
References 47 publications
(105 reference statements)
0
56
0
1
Order By: Relevance
“…We figured out interesting directions for our future work as follows. Since AndroClass utilizes the features representing the actual functionalities and underlying behaviors of apps, we can apply it to malware detection [15,21] and malware classification (i.e., detecting the malware family) [52,53] as well. However, we need to make some minor changes in AndroClass to make it adapted to the aforementioned topics.…”
Section: Resultsmentioning
confidence: 99%
“…We figured out interesting directions for our future work as follows. Since AndroClass utilizes the features representing the actual functionalities and underlying behaviors of apps, we can apply it to malware detection [15,21] and malware classification (i.e., detecting the malware family) [52,53] as well. However, we need to make some minor changes in AndroClass to make it adapted to the aforementioned topics.…”
Section: Resultsmentioning
confidence: 99%
“…With a large number of malware samples being accumulated and publicly available, data mining and machine learning techniques provide an alternative perspective to detect and analyse malicious applications [2]- [10]. In this setting, the issue of malware detections can be treated as a problem of classification, which can be tackled effectively by training an optimal classifier over massive malware samples.…”
Section: A Challengesmentioning
confidence: 99%
“…To represent the behaviour patterns of malware families and samples, we shall first capture the essence of the program and present a concise but comprehensive description for the application to be analysed. Some works adopt a set of typical permissions [7] [8], (bigrams of) API calls [2] [9] [11], or system broadcasts [8] [9] to characterize the behaviours of Android applications; some works employ graphical forms, such as call graphs [12], control flow graphs [9], or other kinds of graphs [13]- [15], to represent the structure and behaviour of an application. Different descriptions will lead to different computational overheads and generate classfiers with different performance.…”
Section: A Challengesmentioning
confidence: 99%
“…However, he used the MalGenome dataset [41] to evaluate the method, which is outdated and only has small subset of DREBIN that is used in our work. EC2 [42] performs Android malware families prediction through static and dynamic features with the ensemble of supervised and unsupervised classifiers. e closest research studies to our work are presented by Kang et al [19,20], Shen et al [21], and Arp et al [12].…”
Section: Malware Family Identificationmentioning
confidence: 99%
“…Like getDeviceId(), a special API provided by Android can be used to obtain the International Mobile Equipment Identity (IMEI) of devices. We ignore other static features like app components and filtered intents used in [12]; this is because the name of them can be easily obfuscated and they are not discriminative in malware classification as they introduce more noisy information [42].…”
Section: Api Callsmentioning
confidence: 99%