2017
DOI: 10.1016/j.dss.2016.09.006
|View full text |Cite
|
Sign up to set email alerts
|

Android application classification and anomaly detection with graph-based permission patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(25 citation statements)
references
References 8 publications
0
24
0
1
Order By: Relevance
“…We figured out interesting directions for our future work as follows. Since AndroClass utilizes the features representing the actual functionalities and underlying behaviors of apps, we can apply it to malware detection [15,21] and malware classification (i.e., detecting the malware family) [52,53] as well. However, we need to make some minor changes in AndroClass to make it adapted to the aforementioned topics.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We figured out interesting directions for our future work as follows. Since AndroClass utilizes the features representing the actual functionalities and underlying behaviors of apps, we can apply it to malware detection [15,21] and malware classification (i.e., detecting the malware family) [52,53] as well. However, we need to make some minor changes in AndroClass to make it adapted to the aforementioned topics.…”
Section: Resultsmentioning
confidence: 99%
“…In the literature, significant attentions have been paid to the topic of malware detection such as the studies in [1,6,7,9,[14][15][16][17][18][19][20][21][22][23][24][25]. However, very fewer efforts have been devoted to the classification of apps.…”
Section: Introductionmentioning
confidence: 99%
“…In the study of Sokolova et al, a system was proposed that characterizes normal behaviors for each application category and emphasizes expected permission requests. Moreover, category patterns and central permissions are obtained using graph analysis metrics [16]. The models obtained are evaluated by the performance of the application classification based on the categories developed [16].…”
Section: Static Analysis Methodsmentioning
confidence: 99%
“…opcode n-grams) was used to construct feature vectors that used in Android apps' classification. Moreover, the number of common permissions between a given application and a specific category pattern has been used as a feature in [92].…”
Section: Semantic Featuresmentioning
confidence: 99%