2021
DOI: 10.3390/sym13061081
|View full text |Cite
|
Sign up to set email alerts
|

AdvAndMal: Adversarial Training for Android Malware Detection and Family Classification

Abstract: In recent years, Android malware has continued to evolve against detection technologies, becoming more concealed and harmful, making it difficult for existing models to resist adversarial sample attacks. At the current stage, the detection result is no longer the only criterion for evaluating the pros and cons of the model with its algorithms, it is also vital to take the model’s defensive ability against adversarial samples into consideration. In this study, we propose a general framework named AdvAndMal, whi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 43 publications
0
8
0
Order By: Relevance
“…Wang et al obtained the API call sequences in the smali file using the Apktool [55] tool [56]. Each *.smali file contained ".class", ".super", ".implements", and ".invoke" related identifiers and object class, super class, interface, and API calls [56]. In this way, all internal function elements of the applications were obtained [56].…”
Section: Related Studiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Wang et al obtained the API call sequences in the smali file using the Apktool [55] tool [56]. Each *.smali file contained ".class", ".super", ".implements", and ".invoke" related identifiers and object class, super class, interface, and API calls [56]. In this way, all internal function elements of the applications were obtained [56].…”
Section: Related Studiesmentioning
confidence: 99%
“…Each *.smali file contained ".class", ".super", ".implements", and ".invoke" related identifiers and object class, super class, interface, and API calls [56]. In this way, all internal function elements of the applications were obtained [56]. A feature database for the system APIs was created and used as a basis for the next feature sequence analysis and visualisation, which contains a total of 50,998 methods in 5858 Android API classes from level 1 to 30, with a fixed colour value setting for each system method [56].…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The work uses sequences of permissions, actions, and APIs of the Android application as a feature vector to train the GAN. Imagebased classification and GAN-based attack are proposed in [30] where system calls of API are used as features to generate RGB images and uses pix2pix adversarial network to generate adversarial examples. Opcode-based image and a GAN is used to generate adversarial example in [31].…”
Section: Related Workmentioning
confidence: 99%
“…Recent works[9,31,[73][74][75] used a similar approach, choosing the Drebin dataset as their source for malicious APKs and Androzoo as their source of benign apps.…”
mentioning
confidence: 99%