2018 6th International Symposium on Digital Forensic and Security (ISDFS) 2018
DOI: 10.1109/isdfs.2018.8355360
|View full text |Cite
|
Sign up to set email alerts
|

Android gaming malware detection using system call analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…In [31], it was deduced that Java, JNI, or native code execution initiated the potential source of unwanted malicious behavior in the malware applications by observing system calls of malicious Android apps. In [32], system calls of apps were analyzed to differentiate benign from malware ones. In [33], malicious apps were detected by Iqbal et al by analyzing several dynamic features such as memory consumption, CPU usage, and system call events.…”
Section: Dynamic Detectionmentioning
confidence: 99%
“…In [31], it was deduced that Java, JNI, or native code execution initiated the potential source of unwanted malicious behavior in the malware applications by observing system calls of malicious Android apps. In [32], system calls of apps were analyzed to differentiate benign from malware ones. In [33], malicious apps were detected by Iqbal et al by analyzing several dynamic features such as memory consumption, CPU usage, and system call events.…”
Section: Dynamic Detectionmentioning
confidence: 99%