2020
DOI: 10.1109/access.2020.2965646
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Familial Classification Based on DEX File Section Features

Abstract: The rapid proliferation of Android malware is challenging the classification of the Android malware family. The traditional static method for classification is easily affected by the confusion and reinforcement, while the dynamic method is expensive in computation. To solve these problems, this paper proposes an Android malware familial classification method based on Dalvik Executable (DEX) file section features. First, the DEX file is converted into RGB (Red/Green/Blue) image and plain text respectively, and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(36 citation statements)
references
References 30 publications
0
36
0
Order By: Relevance
“…In addition, other malware use an obfuscation technique or encrypted methods which cannot be read or decrypted unless the app is executed. A set of papers [28][29][30][31][32][33][34][35][36][37][38][39]42,[46][47][48]50,52,53,[55][56][57]59,62,63,[65][66][67] used static analysis. Details on the static features used by the papers were discussed in Section 4, Features.…”
Section: Static Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, other malware use an obfuscation technique or encrypted methods which cannot be read or decrypted unless the app is executed. A set of papers [28][29][30][31][32][33][34][35][36][37][38][39]42,[46][47][48]50,52,53,[55][56][57]59,62,63,[65][66][67] used static analysis. Details on the static features used by the papers were discussed in Section 4, Features.…”
Section: Static Analysismentioning
confidence: 99%
“…Some literature classifies the malware to malware families based on image representation. In [28], the authors convert the DEX file into an image and plain text. Then, they extract the color and the texture feature from the image.…”
Section: Model-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…This method transforms the DEX file into RGB image and plain text, then extracts the Generalized Search Trees(GIST) texture features, color features, and plain text features of the image as to features, and uses the feature fusion algorithm for classification based on multi-core machine learning. 96% classification accuracy is achieved on the Android malware dataset (AMD) with 24553 malicious samples [48].…”
Section: Malware Detection Using Deep Learning Based On Image Procmentioning
confidence: 99%
“…The detection results show detailed family categories and other information of malicious applications, not just whether the application is malicious. In [48]- [51], it converts file codes into images, and use a neural network to classify Android malware families. See Table 2 for a detailed analysis and comparison.…”
Section: Research Status Analysismentioning
confidence: 99%