2018 IEEE First International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) 2018
DOI: 10.1109/aike.2018.00041
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection Based on Useful API Calls and Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(25 citation statements)
references
References 9 publications
0
25
0
Order By: Relevance
“…Second, the proposed system relies on the information derived from the source code to recognize malicious applications by retrieving the prominent application programming interface (API) calls requested by the malware. Numerous studies [9][10][11][12][13][14][15][16] have suggested that API calls can indicate malicious behavior and provide a detailed evaluation of the applications under investigation. Third, Term Frequency-Inverse Document Frequency (TF-IDF) was employed as a feature-weighting technique to reduce the importance of commonly requested features and increase the importance of rarely requested features.…”
Section: )mentioning
confidence: 99%
“…Second, the proposed system relies on the information derived from the source code to recognize malicious applications by retrieving the prominent application programming interface (API) calls requested by the malware. Numerous studies [9][10][11][12][13][14][15][16] have suggested that API calls can indicate malicious behavior and provide a detailed evaluation of the applications under investigation. Third, Term Frequency-Inverse Document Frequency (TF-IDF) was employed as a feature-weighting technique to reduce the importance of commonly requested features and increase the importance of rarely requested features.…”
Section: )mentioning
confidence: 99%
“…Since the range of the proportion is [0, 1], but the range of the pixel is [0, 255], the range needs to be mapped, and the process is shown in formula (4).…”
Section: ) File Visualizationmentioning
confidence: 99%
“…To improve efficiency, API calls are mainly adopted as features at present. Jung et al [4] built an API feature set and classified samples by machine learning. Ma et al [5] added API call frequency and API call sequence as characteristics based on API calls.…”
Section: Introductionmentioning
confidence: 99%
“…Their experiments reveal that API calls, system library usage and operation sequences are important features for malware detection. The API calls made by applications are used as features for malware classification in a recent work by Jung et al [18]. The approach presented in the paper does not consider sequence of API calls as a whole.…”
Section: Related Workmentioning
confidence: 99%