“…- Permission-based: APK Auditor ( Talha, Alper & Aydin, 2015 ) is a static model that leverages permission-based detection castoff decompressing the APK package; it extracts the malicious symptoms using permission and signature matching analysis. Likewise, Triggerscope ( Fratantonio et al, 2016 ) uses permissions characteristics as an input to classify the application using different machine learning algorithms ( Abdulla & Altaher, 2015 ; Alazab et al, 2020 ; Arora, Peddoju & Conti, 2019 ; Dharmalingam & Palanisamy, 2021 ; Fang, Han & Li, 2014 ; Glodek & Harang, 2013 ; Li et al, 2018 ; Niazi et al, 2015 ; Şahin et al, 2021 ; Shalaginov & Franke, 2014 ; Talha, Alper & Aydin, 2015 ; Tiwari & Shukla, 2018 ).
- Source code based Analysis: Arp et al (2015) extracts features from the application’s Androidmanifest file and source code ; it scrutinizes the code by listing the native calls , API calls , and URL addresses .
…”