2020
DOI: 10.3390/sym12071128
|View full text |Cite
|
Sign up to set email alerts
|

Two Anatomists Are Better than One—Dual-Level Android Malware Detection

Abstract: The openness of the Android operating system and its immense penetration into the market makes it a hot target for malware writers. This work introduces Androtomist, a novel tool capable of symmetrically applying static and dynamic analysis of applications on the Android platform. Unlike similar hybrid solutions, Androtomist capitalizes on a wealth of features stemming from static analysis along with rigorous dynamic instrumentation to dissect applications and decide if they are benign or not. The focu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 26 publications
0
25
0
Order By: Relevance
“…where ( ) and | refer to the prior probability of , and the posterior probability of given feature respectively. Equations (11) and (12) give the entropy of L before and after observing F. The features are ranked in ascending order of their ( ) and the top features that meet the selection criterion are identified for further use. Normally, the features with a high ( ) value are taken to be relevant features, whereas those that do have a lower ( )value are considered not useful feature.…”
Section: Information Gainmentioning
confidence: 99%
See 1 more Smart Citation
“…where ( ) and | refer to the prior probability of , and the posterior probability of given feature respectively. Equations (11) and (12) give the entropy of L before and after observing F. The features are ranked in ascending order of their ( ) and the top features that meet the selection criterion are identified for further use. Normally, the features with a high ( ) value are taken to be relevant features, whereas those that do have a lower ( )value are considered not useful feature.…”
Section: Information Gainmentioning
confidence: 99%
“…These feature extraction methods normally generate very large high-dimensional, redundant and noisy features [ 10 , 11 ]. Some of the raw features offer little or no information that is useful to distinguish malware apps from benign apps and may even impact the performance of the malware detection methods [ 10 , 12 , 13 , 14 ]. As a result, automatic feature subset selection has become a key aspect of machine learning [ 15 ].…”
Section: Introductionmentioning
confidence: 99%
“…When feeding additional features extracted through dynamic analysis to malware detection models, they can typically cope significantly better with the newest and more challenging pieces of malware [4]. However, hybrid analysis systems are inherently more complex, due to the several extra components mandated by dynamic analysis, such as a virtual or real platform, and a user event and input emulator to exercise the app.…”
Section: Analysis Type Feature Extraction Methods Features Extractedmentioning
confidence: 99%
“…Static analysis employed three different tools. Two of them, namely Androtomist [20] and MobSF [21] are open-source, while the other, namely Ostorlab [22], utilised only for outdated software component analysis and taint analysis, is a software-as-a-service (SaaS) product. Details on these tools are given in the respective sections.…”
Section: Methodsmentioning
confidence: 99%
“…Additionally, the lookup for potentially privacy-invasive API calls in the app's code can on the one hand provide supplementary information about higher-risk actions the app may perform, and on the other, reveal whether the identified calls coincide with the requested permissions. For this purpose, as already pointed out, the Androtomist tool [20] has been employed. Specifically, for the needs of this study, the tool collected the permissions from the app's manifest file and the API calls from the smali files.…”
Section: High-level Static Analysismentioning
confidence: 99%