2016 IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA) 2016
DOI: 10.1109/soca.2016.14
|View full text |Cite
|
Sign up to set email alerts
|

SafeDroid: A Distributed Malware Detection Service for Android

Abstract: Abstract-Android platform has become a primary target for malware. In this paper we present SafeDroid, an open source distributed service to detect malicious apps on Android by combining static analysis and machine learning techniques. It is composed by three micro-services, working together, combining static analysis and machine learning techniques. SafeDroid has been designed as a user friendly service, providing detailed feedback in case of malware detection. The detection service is optimized to be lightwe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
2

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 17 publications
(40 reference statements)
0
10
0
2
Order By: Relevance
“…For instance how the size of malware subset influence the accuracy. Although some of the related works (i.e., Safedroid [13,16], etc.) report accuracy up to 99%, we believe that our approach, relying on statistical features, can be an alternative option for detecting malware on Android.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance how the size of malware subset influence the accuracy. Although some of the related works (i.e., Safedroid [13,16], etc.) report accuracy up to 99%, we believe that our approach, relying on statistical features, can be an alternative option for detecting malware on Android.…”
Section: Resultsmentioning
confidence: 99%
“…Depending on the feature selection and the employed classifier accuracy results ranges between 85% to 97%. SafeDroid [13] provides another solution for Android malware detection that uses APIs as a feature, instead of relying on system calls, for retrofitting ML. It consists of the features extraction and the classification reporting services.…”
Section: Applications Programming Interfaces and System Callsmentioning
confidence: 99%
“…In the study of Kang et al, developer information was used as an attribute [21]. It was argued that the detection of malicious software can be made more effective by comparing the application certificate serial number with pre-defined malicious certificate serial numbers [21,22]. Along those lines, Utku and Dogru developed a malicious software detection system based on well-known malicious software at the application level for mobile devices [23].…”
Section: Static Analysis Methodsmentioning
confidence: 99%
“…[157] refers to the experience of Arp et al [88] in the development of Drebin. [148] Information gain (Mutual information), Chi-square statistics (CS), Fisher score (FS) [149] Information gain (Mutual information), Dependence measure [102] Information gain (Mutual information), Dependence measure [150] TF-IDF, cosine similarity [151] Sequential forward selection (SFS) [107] Fisher score (FS) [152] Dependence measure [153] Pearson correlation coefficient [154] Chi-square statistics (CS) [155] Relief algorithm [156] Genetic search (GS) [157] The selection of static features refers to the experience of Arp et al in the Drebin project.…”
Section: Data Transformationmentioning
confidence: 99%