GLOBECOM 2020 - 2020 IEEE Global Communications Conference 2020
DOI: 10.1109/globecom42002.2020.9348206
|View full text |Cite
|
Sign up to set email alerts
|

RGB-based Android Malware Detection and Classification Using Convolutional Neural Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…These methods converted a domain data into a 2D array in image form to apply the CNN-based network structure for image classification to problems in that same domain. Similar attempts have been made in malware family classification [5]- [7], [11], [33], [34], [36]. They convert a malware sample in string form into a 2D array form and apply 2D convolution filters to it.…”
Section: A 1-dimensional Convolution Filters For Malware Family Classificationmentioning
confidence: 95%
See 2 more Smart Citations
“…These methods converted a domain data into a 2D array in image form to apply the CNN-based network structure for image classification to problems in that same domain. Similar attempts have been made in malware family classification [5]- [7], [11], [33], [34], [36]. They convert a malware sample in string form into a 2D array form and apply 2D convolution filters to it.…”
Section: A 1-dimensional Convolution Filters For Malware Family Classificationmentioning
confidence: 95%
“…Darwaish and Naït-Abdesselam [34] converted several elements inside an APK file into an RGB image, and they fixed the image using the nearest neighbour interpolation. They extracted permissions, intents, activities and services from the manifest, then mapped the extracted information to the green channel.…”
Section: Background and Related Work A Structure Of Apk Filesmentioning
confidence: 99%
See 1 more Smart Citation
“…Darwaish and Naït-Abdesselam extracted permissions, activities, intents, services, providers, and receiver properties from the AndroidManifest.xml file using the .apk file Androguard [52] tool, as well as API calls, unique opcode sequences, and protected string properties [53]. Each character of all extracted application properties was converted into pixel values using ASCII code and filtering was performed with the help of a predefined dictionary [53].…”
Section: Related Studiesmentioning
confidence: 99%
“…In [29], the authors created an adjacency matrix of Android APK and converted it into an image as an input to the CNN model. Darwaish et al developed an intelligent mapping algorithm of APK files to RGB images [31]. Their proposed system mapped the Manifest file to the green channel.…”
Section: Vision Ml-based Analysismentioning
confidence: 99%