Proceedings of the SouthEast Conference 2017
DOI: 10.1145/3077286.3077288
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Features for Android Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…Their article analysed two major characteristics for Android malware detection, permission and system calls, and applied machinery education to both. The results suggested that permission data is better for malware detection than system call data [79].…”
Section: Fig 2 Architecture Of Droid Deep [73]mentioning
confidence: 99%
“…Their article analysed two major characteristics for Android malware detection, permission and system calls, and applied machinery education to both. The results suggested that permission data is better for malware detection than system call data [79].…”
Section: Fig 2 Architecture Of Droid Deep [73]mentioning
confidence: 99%
“…The purpose of this method was to verify whether the app's benefits outweighed its expected risks. Some studies [3], [29], [37]- [39], [41], [44], [46], [77], [83], [196], [214], [216], [233], [235], [238] extracted permissions as well as some other features and utilized machine learning to detect malapps. This approach usually achieved accuracy as more than 94%.…”
Section: ) Permissionmentioning
confidence: 99%
“…The experimental results demonstrated that their approach possessed the malapp detection ability with high accuracy. Leeds et al [214] compared static and dynamic analysis of Android apps. They extracted permissions requested at install-time as static features for static analysis.…”
Section: ) System Callmentioning
confidence: 99%
“…The features examination for Android malware detection is also researched in [16], by considering the Java API call data as features sources for malware detection. The extracted features are weighted in order to provide some reliable indicators of the malicious potential of the source data or Android app.…”
Section: Related Workmentioning
confidence: 99%
“…The hyperparameters are the higher-level properties of the model that are chosen by the user. Other typical examples of hyperparameters are: the decay rate of the learning rate, the number of training steps, the size of training dataset [16].…”
Section: Related Workmentioning
confidence: 99%