2022
DOI: 10.1186/s42400-022-00119-8
|View full text |Cite
|
Sign up to set email alerts
|

On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

Abstract: As the smartphone market leader, Android has been a prominent target for malware attacks. The number of malicious applications (apps) identified for it has increased continually over the past decade, creating an immense challenge for all parties involved. For market holders and researchers, in particular, the large number of samples has made manual malware detection unfeasible, leading to an influx of research that investigate Machine Learning (ML) approaches to automate this process. However, while some of th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 83 publications
0
5
0
Order By: Relevance
“…An essential and intricate aspect of organizing malware analysis lies in the comprehensive consideration of all aspects and attributes of Android applications, while safeguarding the retention of critical features. Several recent review papers provide comprehensive overviews of past works and research efforts in Android malware analysis [8][9][10][11]. This assumes paramount significance and complexity, notably due to increase in use of obfuscation techniques.…”
Section: Related Workmentioning
confidence: 99%
“…An essential and intricate aspect of organizing malware analysis lies in the comprehensive consideration of all aspects and attributes of Android applications, while safeguarding the retention of critical features. Several recent review papers provide comprehensive overviews of past works and research efforts in Android malware analysis [8][9][10][11]. This assumes paramount significance and complexity, notably due to increase in use of obfuscation techniques.…”
Section: Related Workmentioning
confidence: 99%
“…ML algorithms can analyze memory dumps and recognize patterns associated with malware, rootkits, and other malicious activities. it has been used for over a past decade to detect the malwares [5]. By training on labeled data, ML models can learn to identify anomalies and deviations from normal system behavior [6].…”
Section: Machine Learning (Ml) In Memory Analysismentioning
confidence: 99%
“…However, despite this surge in research activity, most of the review papers that are cited do not primarily focus on examining hybrid approaches. For example, Shu et al [20], Koushki et al [21], and Meijin et al [22] review papers include discussions on malware detection that involve static, dynamic, and hybrid approaches. It is crucial to have a focused review that considers the distinct characteristics of hybrid approaches compared to other approaches, such as static and dynamic approaches.…”
Section: Introductionmentioning
confidence: 99%