2015
DOI: 10.1002/sec.1340
|View full text |Cite
|
Sign up to set email alerts
|

Smart malware detection on Android

Abstract: Nowadays, because of its increased popularity, Android is target to a growing number of attacks and malicious applications, with the purpose of stealing private information and consuming credit by subscribing to premium services. Most of the current commercial antivirus solutions use static signatures for malware detection, which may fail to detect different variants of the same malware and zero‐day attacks. In this paper, we present a behavior‐based, dynamic analysis security solution, called Android Malware … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 26 publications
0
11
0
Order By: Relevance
“…Up to now, a growing effort has been devoted to Android malware [10]. From an intrusion detection perspective, many machine learning algorithms have been applied to differentiate between legitimate and malicious Android apps, such as classifiers [11], [12], [13], [14] and clustering [15]. Under a similar perspective, some other approaches based on knowledge discovery [16], visual inspection [17], and weighted similarity matching of logs [18] have been also proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Up to now, a growing effort has been devoted to Android malware [10]. From an intrusion detection perspective, many machine learning algorithms have been applied to differentiate between legitimate and malicious Android apps, such as classifiers [11], [12], [13], [14] and clustering [15]. Under a similar perspective, some other approaches based on knowledge discovery [16], visual inspection [17], and weighted similarity matching of logs [18] have been also proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The initial data was collected through the framework described in [1,2] which relies on a data collection framework within the smartphone and the installation of an additional application that performs the real-time monitoring while running in background (called AMDS in [2]). The application pool was built by using both reputable applications (the ones that the phone came with, top Google Play applications, or similar stores for other markets such as SlideMe [4]) as well as known malware applications.…”
Section: Methodsmentioning
confidence: 99%
“…After this step the target application was uninstalled, to prevent both reaching lack of storage space during the experiment as well as preventing some applications from influencing one another and the next target application from the list was installed and experimented with. During the training phase a data of monitoring each target application was stored locally in the phone, and during testing phase a different pool of applications was used, each application installed, monitored, local data stored updated, while the real-time monitoring application described at large in [2], was running in background, and if abnormal behavior was detected this application would be prevented from running, it would be flagged to the user who would make the final decision (to continue preventing the application from running or allow it to continue) on a case by case basis.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Malware, today, is increasingly sophisticated and avoids detection by changing its patterns each time it runs [30]. The changing of patterns makes detection nearly impossible.…”
Section: Security Issues Attack Vectors Attack Types Impactsmentioning
confidence: 99%