2018 International Conference on System Science and Engineering (ICSSE) 2018
DOI: 10.1109/icsse.2018.8520241
|View full text |Cite
|
Sign up to set email alerts
|

A SVM-Based Malware Detection Mechanism for Android Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…[56] UMUDGA 49 [59] Windows 10 ISO files 50 [63] Windows 7 Ultimate 32-bit directory 51 [94] Windows OS clean files 52 [117] Windows Portable Executables 53 [78] Windows Registry 54 [103] WireLurker 55 [83] Xiaomi App Store 56 [61], [62], [95] Android Malware Dataset (AMD) 57 [83], [105] AndroidManifest files 58 [81], [93] CLEAN…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…[56] UMUDGA 49 [59] Windows 10 ISO files 50 [63] Windows 7 Ultimate 32-bit directory 51 [94] Windows OS clean files 52 [117] Windows Portable Executables 53 [78] Windows Registry 54 [103] WireLurker 55 [83] Xiaomi App Store 56 [61], [62], [95] Android Malware Dataset (AMD) 57 [83], [105] AndroidManifest files 58 [81], [93] CLEAN…”
Section: Resultsmentioning
confidence: 99%
“…, [56], [57], [60], [61], [64], [66], [67], [69], [70], [71], [76], [81], [83], [84], [85], [87], [88], [90], [94], [96], [100], [101], [102], [105], [109], [113], [119], [121], [125] Signaturebased false positive rate and raising the false negative rate overcomes the limitations of heuristic-based approaches.…”
Section: D: Specification-basedmentioning
confidence: 99%
“…Benchmark testing was based on the calculated overhead consumption of CPU, memory, I/O, 2D and 3D graphic video games, with total consumption of 0.9%, 9.4%, 4%, 0%, and 0%, respectively. Lu et al [122] collected 400 apps (200 normal apps and 200 malicious apps), extracted permission logs, which were Figure 8: Multi-level Anomaly Detector for Android Malware (MADAM) scheme [118] initially saved in a sequential manner in CSV format, then translated the file into (.scale) for later categorization of the features. The authors utilized signatures in Antivirus programs and applied an LibSVM [123] algorithm to classify the apps, and obtained 100%, 0%, 2%, 98%, and 99% for TP, FN, FP, TN, and recognition rate, respectively.…”
Section: Tip Calculatormentioning
confidence: 99%