2019
DOI: 10.1007/978-3-030-29407-6_4
|View full text |Cite
|
Sign up to set email alerts
|

Static, Dynamic and Intrinsic Features Based Android Malware Detection Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…To evade the malware detection model, the attacker needs to extract features [6,7] and compute feature values that can evade detection without damaging the malware. This often requires knowledge of the structure inside the detector.…”
Section: Overviewmentioning
confidence: 99%
“…To evade the malware detection model, the attacker needs to extract features [6,7] and compute feature values that can evade detection without damaging the malware. This often requires knowledge of the structure inside the detector.…”
Section: Overviewmentioning
confidence: 99%
“…It extracts static features [23] such as permission, code related information, API and based on them, identifying the nature of application. The second category observes activities during run-time to make decision about the application nature [24]. The third category combines properties from static and dynamic [25].…”
Section: Related Workmentioning
confidence: 99%
“…Combination of features can be exploited. Mantoo and Khurana [24] use this principle on permissions, system calls and intrinsic features with linear discriminant analysis as feature engineering technique. In [37], the authors associate log features related to file I/O, network flows, and cryptographic usage.…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning (ML) is an approach in which the system learns a pattern, develops a model, and generates predictions by observing only the input data. In implementing malicious detection systems for Android applications, the machine learning analysis approach utilizes several features of the Android app including API calls, permissions, and control flows [17]. However, obtaining such features can be performed by static, dynamic, or hybrid approaches [18].…”
Section: B Static/dynamic Ml-based Analysismentioning
confidence: 99%
“…Various behavior-based characteristics can be acquired during the dynamic analysis such as network traffic activities [25], API calls [26], and system log files [27]. For further classification, the obtained behavioral features are combined in the features dataset [17]. However, since the dynamic analysis is performed in an isolated environment, the malware may change its behavior during its run-time.…”
Section: B Static/dynamic Ml-based Analysismentioning
confidence: 99%