2021
DOI: 10.1016/j.cose.2021.102264
|View full text |Cite
|
Sign up to set email alerts
|

GDroid: Android malware detection and classification with graph convolutional network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 108 publications
(46 citation statements)
references
References 23 publications
0
29
0
1
Order By: Relevance
“…They proposed to use GNN and its variants to learn the representations of the network flow graphs. GDroid [19] proposed a heterogeneous graph to be fed into the graph convolutional network. The heterogeneous graph consists of edges representing patterns of the API invocations by the apps and the API occurrence in the methods.…”
Section: B Deep Learning-based Malware Detectionmentioning
confidence: 99%
“…They proposed to use GNN and its variants to learn the representations of the network flow graphs. GDroid [19] proposed a heterogeneous graph to be fed into the graph convolutional network. The heterogeneous graph consists of edges representing patterns of the API invocations by the apps and the API occurrence in the methods.…”
Section: B Deep Learning-based Malware Detectionmentioning
confidence: 99%
“…In [21], GDroid was proposed for Android malware detection by utilizing word embedding and GNN techniques. The skip-gram model extracted the features for graph nodes based on API sequences.…”
Section: Android Malware Detection Based On Graph Representation Lear...mentioning
confidence: 99%
“…Compared with static analysis, dynamic analysis is less affected by obfuscation and shelling, but it consumes resources and has difficulty covering all execution paths. GDroid [9] maps applications and their APIs to construct a heterogeneous graph, which performs better in both detection and family classification, but does not take into account the network behavior characteristics of malware, and therefore uses traffic files as a feature for dynamic analysis in our work. Describing malware as a two-dimensional image [10] is more convenient in feature engineering, which somewhat inspired our treatment when dealing with traffic files.…”
Section: Related Workmentioning
confidence: 99%