2018
DOI: 10.18535/sshj/v2i10.109
|View full text |Cite
|
Sign up to set email alerts
|

Malware Analysis on Android Apps: A Permission-Based Approach

Abstract: The use of Android devices nowadays is almost inevitable. Having been able to get a big slice of the mobile operating systems, Android has become a wide target for malware attacks. Malware detection analysis in this study is done to contribute to the many various ways in doing the malware analysis using classification algorithm using Random Forest and Naive Bayesian. This study used a static method of analyzing and detecting malware applications through the permission requests made by each Android application … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 14 publications
0
0
0
Order By: Relevance
“…Mobile devices have penetrated the world's economy in almost all fields, especially in e-commerce, social media, medicine, communication, education, among others. Their ubiquity has endeared them to many users including malware developers and hackers who exploit them for their nefarious activities such as blackmail and arm-twist users to grant dangerous permissions, distort operations and steal information and personal data to make money (Atkinson, 2015;Gamao, 2018). Other motives behind malware attacks include espionage, ideology (terrorism) and fun (Verizon, 2018;GSMA, 2019).…”
Section: Introductionmentioning
confidence: 99%
“…Mobile devices have penetrated the world's economy in almost all fields, especially in e-commerce, social media, medicine, communication, education, among others. Their ubiquity has endeared them to many users including malware developers and hackers who exploit them for their nefarious activities such as blackmail and arm-twist users to grant dangerous permissions, distort operations and steal information and personal data to make money (Atkinson, 2015;Gamao, 2018). Other motives behind malware attacks include espionage, ideology (terrorism) and fun (Verizon, 2018;GSMA, 2019).…”
Section: Introductionmentioning
confidence: 99%