2023
DOI: 10.1007/978-3-031-20096-0_18
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Android Malware Detection Based on Deep Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 62 publications
0
4
0
Order By: Relevance
“…Injection game cheating programs often have a high degree of specificity, specifically targeting at one game to implement cheating functions. The implementation of injection game cheating programs requires the use of plugins to inject functional modules into the game process space (Wang et al, 2023). After being injected into the game process space, the functional module can perform a HOOK operation, and through the HOOK operation, it can jump to the code written by the game cheating program author to perform the program written by the game cheating program author.…”
Section: Injection Game Cheating Programmentioning
confidence: 99%
“…Injection game cheating programs often have a high degree of specificity, specifically targeting at one game to implement cheating functions. The implementation of injection game cheating programs requires the use of plugins to inject functional modules into the game process space (Wang et al, 2023). After being injected into the game process space, the functional module can perform a HOOK operation, and through the HOOK operation, it can jump to the code written by the game cheating program author to perform the program written by the game cheating program author.…”
Section: Injection Game Cheating Programmentioning
confidence: 99%
“…The Androtomist tool proposed in [34] [62], and Wu et al [10], as well as the many references therein.…”
Section: Other Approaches and Surveys On The Topicmentioning
confidence: 99%
“…Wang et al [20] conducted a survey of Android malware detection tools and techniques and provided an overview of commonly used algorithms, datasets, evaluation metrics, and indicators. The goal of this article is to provide a guide to Android malware detection and antivirus solutions that can cater to malware spread.…”
Section: Literature Reviewmentioning
confidence: 99%