2019
DOI: 10.1109/access.2019.2958927
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Detection Based on Factorization Machine

Abstract: As the popularity of Android smart phones has increased in recent years, so too has the number of malicious applications. Due to the potential for data the mobile phone users face, the detection of malware on Android devices has become an increasingly important issue in cyber security. Traditional methods like signature-based routines are unable to protect users from the ever-increasing sophistication and rapid behavior changes in new types of Android malware. erefore, a great deal of e ort has been made recen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 66 publications
(39 citation statements)
references
References 24 publications
0
37
0
Order By: Relevance
“…The extracted features of the parsed applications have to be serialized for further analysis. The representation of the serialized features can be implemented using the U − dimensional format where U represents the feature set [69]. As shown in Figure 5, all the features under investigation (F ) are stored in one list of length |F |.…”
Section: Parsing Phasementioning
confidence: 99%
“…The extracted features of the parsed applications have to be serialized for further analysis. The representation of the serialized features can be implemented using the U − dimensional format where U represents the feature set [69]. As shown in Figure 5, all the features under investigation (F ) are stored in one list of length |F |.…”
Section: Parsing Phasementioning
confidence: 99%
“…Talha et al [ 19 ] presented a permission-based Android malware detection system consisting of three components, namely the central server, Android client and signature database, and static analysis is used to categorize the Android application as normal or harmful. Li et al [ 20 ] raised the issue of considering interaction terms across features for the discovery of malicious behavior patterns in Android applications and proposed a classier for Android malware detection based on a factorization machine architecture.…”
Section: Related Workmentioning
confidence: 99%
“…Early approaches in involved differentiating files based on sequences of api calls as in [20], in which the author builds a model based on ngrams of api calls. See [35] and [21] for similar approaches.…”
Section: B Related Workmentioning
confidence: 99%