2021
DOI: 10.1016/j.jisa.2020.102696
|View full text |Cite
|
Sign up to set email alerts
|

NATICUSdroid: A malware detection framework for Android using native and custom permissions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(25 citation statements)
references
References 23 publications
0
24
0
1
Order By: Relevance
“…An innovative malware detection framework for Android has looked into more than 29,000 benign and malware apps in the period 2010 to 2019 to identify the most significant permissions [16]. The authors evaluated eight ML algorithms and founds that the Random Forest classifier based model performed best…”
Section: Related Workmentioning
confidence: 99%
“…An innovative malware detection framework for Android has looked into more than 29,000 benign and malware apps in the period 2010 to 2019 to identify the most significant permissions [16]. The authors evaluated eight ML algorithms and founds that the Random Forest classifier based model performed best…”
Section: Related Workmentioning
confidence: 99%
“…Mathur et al [27] presented a malware detection framework for Android called NATICUSdroid, which investigated and classified benign and malware using statistically selected native and custom Android permissions as features for various ML classifiers. However, these approaches were limited to only mobile resources for its processing and classification.…”
Section: Related Workmentioning
confidence: 99%
“…In the case of static, a receiver is specified in the AndroidManifest.xml and has an identical lifetime to the app. The receiver utilizes a callback approach i.e., BroadcastReceiver.onReceive(), to override SDK calls [27].…”
Section: B Data Protection Servicementioning
confidence: 99%
“…Three other Android malware that emerged in 2010 included SMSReplicator, Geinimi, and Fakeplayer [45]. Both AndroidOS.DroidSMS.A and the Tap Snake game did not infect many devices, because the attack vectors were limited due to a lack of cross-platform propagation ability.…”
Section: B Evolution Of Android Malwarementioning
confidence: 99%