2018
DOI: 10.1007/978-3-319-93638-3_48
|View full text |Cite
|
Sign up to set email alerts
|

ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…Based on a supervised classification method and an unsupervised segmentation approach, EC2 [8] presented an Android harmful application family classification method. The API call execution sequence [9,10] aids in having understood the target attack application's behavior and thread information. Tao et al [11] examined the importance of sensitive APIs shielded by privileges and extracted malware patterns from known malware specimens to efficiently identify malicious.…”
Section: Related Workmentioning
confidence: 99%
“…Based on a supervised classification method and an unsupervised segmentation approach, EC2 [8] presented an Android harmful application family classification method. The API call execution sequence [9,10] aids in having understood the target attack application's behavior and thread information. Tao et al [11] examined the importance of sensitive APIs shielded by privileges and extracted malware patterns from known malware specimens to efficiently identify malicious.…”
Section: Related Workmentioning
confidence: 99%
“…At present, most studies focus on the application behavior characteristics, and API is one of the most frequently used features. The execution sequence of API calls [19,20] helps to fully understand the activity and thread information of the target malware application. Omid et al [21] researched the similarity behaviors of different malware families based on sensitive APIs for classification.…”
Section: Android Malware Behaviour Detectionmentioning
confidence: 99%
“…In addition, it requires a priori knowledge of the malware technique to monitor. Several papers have applied dynamic analysis such as [43,44,49,54,58,61]. Details on the dynamic features used by the papers were discussed in Section 4, Features.…”
Section: Dynamic Analysismentioning
confidence: 99%
“…In [49], resources' consumption is utilized as features for their classification. In [43], the authors use sensitive and permission-related API calls.…”
Section: Dynamic Featuresmentioning
confidence: 99%