2019
DOI: 10.1186/s13635-019-0087-1
|View full text |Cite
|
Sign up to set email alerts
|

Machine learning-based dynamic analysis of Android apps with improved code coverage

Abstract: This paper investigates the impact of code coverage on machine learning-based dynamic analysis of Android malware. In order to maximize the code coverage, dynamic analysis on Android typically requires the generation of events to trigger the user interface and maximize the discovery of the run-time behavioral features. The commonly used event generation approach in most existing Android dynamic analysis systems is the random-based approach implemented with the Monkey tool that comes with the Android SDK. Monke… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 51 publications
0
16
0
Order By: Relevance
“…Yerima et al [27] researched the generation process of stateful events and designed a new method to improve the code coverage in dynamic analysis for malware detection.…”
Section: Dynamic Structural Feature-based Detection Methodsmentioning
confidence: 99%
“…Yerima et al [27] researched the generation process of stateful events and designed a new method to improve the code coverage in dynamic analysis for malware detection.…”
Section: Dynamic Structural Feature-based Detection Methodsmentioning
confidence: 99%
“…The objects are Blue or Red; the dividing lines identify the border, so an object on the right side is called blue, meaning benign, a general scenario and likewise. This is an example of linear classification, but not all classifications are this basic, and functional groups are needed to differentiate between groups [57], [58].…”
Section: ) Algorithm Characteristics Appraisalmentioning
confidence: 99%
“…Moreover, the virtual environment can easily be evaded by the botnets using different fingerprinting techniques. In addition, being a dynamic-analysis based approach, the systems effectiveness could be degraded by the lack of complete code coverage [17,18].…”
Section: Related Workmentioning
confidence: 99%