2018
DOI: 10.1016/j.compeleceng.2017.11.028
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning-assisted signature and heuristic-based detection of malwares in Android devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 84 publications
(28 citation statements)
references
References 4 publications
0
26
0
2
Order By: Relevance
“…If the expressions and constraints of an application are in this rule library, this application will be considered as a malicious application. For example, to reduce the high false- [15], [16], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [94], [95], [98], [99], [100], [101], [102], [105], [109], [111],…”
Section: ) Publication Sourcementioning
confidence: 99%
“…If the expressions and constraints of an application are in this rule library, this application will be considered as a malicious application. For example, to reduce the high false- [15], [16], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [94], [95], [98], [99], [100], [101], [102], [105], [109], [111],…”
Section: ) Publication Sourcementioning
confidence: 99%
“…They utilized broadcast receivers as one of the features for malapp detection, and compared them with the Android broadcast events. Rehman et al [217] proposed framework considering both signature and heuristic-based analysis for detecting Android apps. During static analysis, they extracted some representative features including providers' and receivers' information.…”
Section: ) App Componentmentioning
confidence: 99%
“…Dam et al [84] constructed API call graph from the CFG by applying a kind of control point reachability analysis on the CFG, to carry out further experiments. Rehman et al [217] utilized malware evolution attack and malware confusion attack to enhance feasibility of the attacks. They applied these two strategies for their presented Malware Recomposition Variation (MRV).…”
Section: ) Cfgmentioning
confidence: 99%
“…This approach gains maximum points based upon some situations [6][7][8] Henceforth this approach similar to the evaluation process with the answer key where predication is based on experience from various levels. The agent will get rewards from many obstacles between him succeeding in his levels as shown in Figure 1.…”
Section: Reinforcement Learningmentioning
confidence: 99%