Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis 2021
DOI: 10.1145/3460319.3464833
|View full text |Cite
|
Sign up to set email alerts
|

HomDroid: detecting Android covert malware by social-network homophily analysis

Abstract: Android has become the most popular mobile operating system. Correspondingly, an increasing number of Android malware has been developed and spread to steal users' private information. There exists one type of malware whose benign behaviors are developed to camouflage malicious behaviors. The malicious component occupies a small part of the entire code of the application (app for short), and the malicious part is strongly coupled with the benign part. In this case, the malware may cause false negatives when ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 46 publications
0
5
0
Order By: Relevance
“…There are many existing methods of AMDs based on machine learning, utilizing features like permission, Android API, Android component, Dalvik code, Call Graph and so on [8], [3], [60], [7], [11], [4], [5], [34], [61], [6], [40], [62], [19]. DREBIN [7] extracts features from AndroidManifest.xml files and Dalvik bytecode by static analysis for behavioral modeling to detect malware.…”
Section: Related Work Ml-based Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…There are many existing methods of AMDs based on machine learning, utilizing features like permission, Android API, Android component, Dalvik code, Call Graph and so on [8], [3], [60], [7], [11], [4], [5], [34], [61], [6], [40], [62], [19]. DREBIN [7] extracts features from AndroidManifest.xml files and Dalvik bytecode by static analysis for behavioral modeling to detect malware.…”
Section: Related Work Ml-based Methodsmentioning
confidence: 99%
“…MalScan [5] leverages centralities of sensitive android APIs in CG as a feature vector for conducting classification. Similar related works also include [62] and [19]. Malicious Code Fragment Detection (MCFD).…”
Section: Related Work Ml-based Methodsmentioning
confidence: 99%
See 3 more Smart Citations