2022
DOI: 10.1371/journal.pone.0276332
|View full text |Cite
|
Sign up to set email alerts
|

Android malware detection method based on highly distinguishable static features and DenseNet

Abstract: The rapid growth of malware has become a serious problem that threatens the security of the mobile ecosystem and needs to be studied and resolved. Android is the main target of attackers due to its open source and popularity. To solve this serious problem, an accurate and efficient malware detection method is needed. Most existing methods use a single type of feature, which can be easily bypassed, resulting in low detection accuracy. In addition, although multiple types of features are used in some methods to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 67 publications
0
2
0
Order By: Relevance
“…However, these works concentrated only on the requested permission (also known as declared permission) rather than real permission usage. Requested permissions are those that the app developers declare in the AndroidManifest.xml file [4], which indicates the permissions the specific Android application will use. But it didn't happen to be the real permissions the app developers may later use in the code.…”
Section: A Motivation and Major Contributionmentioning
confidence: 99%
“…However, these works concentrated only on the requested permission (also known as declared permission) rather than real permission usage. Requested permissions are those that the app developers declare in the AndroidManifest.xml file [4], which indicates the permissions the specific Android application will use. But it didn't happen to be the real permissions the app developers may later use in the code.…”
Section: A Motivation and Major Contributionmentioning
confidence: 99%
“…However, it's important to note that the results of decompilation may not be identical to the original code, as compiler optimizations and code obfuscation techniques can result in partial information loss or obfuscation. [4] (2) Dynamic Analysis and Static Analysis Techniques In reverse engineering, dynamic analysis and static analysis are two commonly used technical approaches. Dynamic analysis involves running the application and monitoring its behavior to gather information.…”
Section: Fundamentals Of Android Reverse Engineeringmentioning
confidence: 99%