2021
DOI: 10.1007/978-981-16-4118-3_12
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Android Malware Detection Utilizing API Calls and Permissions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Chowdhury, Q.E. Alahy, and H. Soliman proposed a method for detecting Android malware [14]. The proposed approach involves creating a feature vector based on API calls and permissions, which are then used to train a machine learning classifier.…”
Section: Comparison Of the Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Chowdhury, Q.E. Alahy, and H. Soliman proposed a method for detecting Android malware [14]. The proposed approach involves creating a feature vector based on API calls and permissions, which are then used to train a machine learning classifier.…”
Section: Comparison Of the Approachesmentioning
confidence: 99%
“…2. List of sensitive APIs [14] The static analysis involves extracting features from the Android Manifest and the Dalvik Bytecode, while the dynamic analysis involves capturing system calls and network behavior. The dataset used for evaluation consists of over 10,000 Android applications, of which 5,000 are benign and 5,000 are malicious.…”
Section: Comparison Of the Approachesmentioning
confidence: 99%