2019
DOI: 10.5121/ijnsa.2019.11101
|View full text |Cite
|
Sign up to set email alerts
|

Malware Detection Using Machine Learning Algorithms and Reverse Engineering of Android Java Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…Parsing tools can help learn which permissions, packages or services an application offers by analyzing the AndroidManifest.xml file, such as permission android.permission.call phone, which allows an application to misuse calling abilities. The paper elaborates exactly what sort of sensitive API the authors could name by decoding the classes.dex file with the Jadx-gui disassembler [19]. In certain cases, including two permissions in a single app can signify the app's possible malicious attacks.…”
Section: Figure 2 Static Binary Matrix Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…Parsing tools can help learn which permissions, packages or services an application offers by analyzing the AndroidManifest.xml file, such as permission android.permission.call phone, which allows an application to misuse calling abilities. The paper elaborates exactly what sort of sensitive API the authors could name by decoding the classes.dex file with the Jadx-gui disassembler [19]. In certain cases, including two permissions in a single app can signify the app's possible malicious attacks.…”
Section: Figure 2 Static Binary Matrix Extractionmentioning
confidence: 99%
“…AdaBoost takes those classified samples and features used by decision trees and generates higher weights for correct results after training on those features again. (x,y) are the stored values by decision trees which are given as input values for AdaBoost to enhance accuracy, hence the model with the highest accuracy in fig19. This program performs in a way that when all the models are done training, the script generates a graph using the plt.bar command to display the algo that classifies most applications correctly.…”
mentioning
confidence: 99%
“…As mentioned previously, the SVM is able to divide the different classes of components by the help of hyper planes. SVM classification algorithms are divided into linear SVM classification algorithms and nonlinear SVM classification algorithms [23]. Linear SVM classification algorithm classes are split between each other by the help of a straight line.…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…When we employ the SVM algorithms, it has a mathematical method known as the kernel trick. This method is able to make it feasible to obtain the same result like in case that you have added a lot of polynomial features, even in case that the polynomial may be of a very high degree, without being necessary to add all these polynomials [23].…”
Section: Machine Learning Algorithmsmentioning
confidence: 99%
“…A detection accuracy of 94.1% was achieved and an F-score of 92.4% which indicated that the model can successfully detect both malware and benign applications. [21] deployed reverse engineering method and the analysis of Random Forest, kNN, SVM, Naive Bayes and Logistic Regression on java code features in order to study the most effective algorithm for Android malware detection. The study showed that Random Forest had the best detection rate of 80.67% followed by k-NN with 80.33%.…”
Section: Related Workmentioning
confidence: 99%