2020
DOI: 10.1007/s12652-020-01957-5
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: A novel permission ranking system for android malware detection—the permission grader

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 19 publications
0
2
0
1
Order By: Relevance
“…Until today, many static analysis researchers depends on permissions ( Arora, Peddoju & Conti, 2019 ; Dharmalingam & Palanisamy, 2021 ; Li et al, 2018 ; Şahin et al, 2021 ); however, many are relying on API calls ( Alazab et al, 2020 ; Jung et al, 2018 ; Maiorca et al, 2017 ; Mirzaei et al, 2019 ; Pektaş & Acarman, 2020 ; Tiwari & Shukla, 2018 ; Zhang et al, 2020 ; Zhang, Breitinger & Baggili, 2016 ; Zou et al, 2021 ) and deep code analysis and other types of features as discussed earlier in Android evasion detection frameworks section. Many of examined researches ignored the evasion techniques evaluation.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Until today, many static analysis researchers depends on permissions ( Arora, Peddoju & Conti, 2019 ; Dharmalingam & Palanisamy, 2021 ; Li et al, 2018 ; Şahin et al, 2021 ); however, many are relying on API calls ( Alazab et al, 2020 ; Jung et al, 2018 ; Maiorca et al, 2017 ; Mirzaei et al, 2019 ; Pektaş & Acarman, 2020 ; Tiwari & Shukla, 2018 ; Zhang et al, 2020 ; Zhang, Breitinger & Baggili, 2016 ; Zou et al, 2021 ) and deep code analysis and other types of features as discussed earlier in Android evasion detection frameworks section. Many of examined researches ignored the evasion techniques evaluation.…”
Section: Discussionmentioning
confidence: 99%
“… Permission-based: APK Auditor ( Talha, Alper & Aydin, 2015 ) is a static model that leverages permission-based detection castoff decompressing the APK package; it extracts the malicious symptoms using permission and signature matching analysis. Likewise, Triggerscope ( Fratantonio et al, 2016 ) uses permissions characteristics as an input to classify the application using different machine learning algorithms ( Abdulla & Altaher, 2015 ; Alazab et al, 2020 ; Arora, Peddoju & Conti, 2019 ; Dharmalingam & Palanisamy, 2021 ; Fang, Han & Li, 2014 ; Glodek & Harang, 2013 ; Li et al, 2018 ; Niazi et al, 2015 ; Şahin et al, 2021 ; Shalaginov & Franke, 2014 ; Talha, Alper & Aydin, 2015 ; Tiwari & Shukla, 2018 ). Source code based Analysis: Arp et al (2015) extracts features from the application’s Androidmanifest file and source code ; it scrutinizes the code by listing the native calls , API calls , and URL addresses .…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…One distinguishing aspect of this study is the inclusion of additional details, such as application name and version, during the malware detection process. Dharmalingam and Palanisamy (2021) proposed the Permission Grading System (PGS) to extract requested permissions from applications and detect the permissions that are special to malware and benign apps, with the contribution of each permission calculated. The presented model is effective only when malware and benign applications have different sets of permission.…”
Section: Manifest Featuresmentioning
confidence: 99%
“…A importância das características para o processo de detecc ¸ão de malwares é facilmente compreendida quando se empregam soluc ¸ões baseadas no aprendizado de máquina [Wang et al, 2019, Sharma andRattan, 2021]. Isto porque, para o correto funcionamento, essas soluc ¸ões (e seus modelos) dependem de conjuntos de dados (datasets) corretos e atualizados, requerendo assim a extrac ¸ão detalhada de características dos aplicativos [Dharmalingam and Palanisamy, 2021, Alazab et al, 2020, Zhang et al, 2020.…”
Section: Introduc ¸ãOunclassified