2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computi 2015
DOI: 10.1109/uic-atc-scalcom-cbdcom-iop.2015.135
|View full text |Cite
|
Sign up to set email alerts
|

API Sequences Based Malware Detection for Android

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Detecting Android malware uses techniques in two categories, either static analysis, with no code execution, or dynamic analysis, with an app executed in real-time and its behaviour studied. Traditional ML algorithms were adopted in early work, including SVMs [7], [8], [9], naive Bayes [10], kNN, k-means clustering [11], [12] and decision trees [10], [13], [14], [15], [16]. Such methods tend to have hand-crafted, manual rankings or selections of input features [10], [15], [17], [18].…”
Section: Related Work a Traditional ML Android Malware Detection Tech...mentioning
confidence: 99%
“…Detecting Android malware uses techniques in two categories, either static analysis, with no code execution, or dynamic analysis, with an app executed in real-time and its behaviour studied. Traditional ML algorithms were adopted in early work, including SVMs [7], [8], [9], naive Bayes [10], kNN, k-means clustering [11], [12] and decision trees [10], [13], [14], [15], [16]. Such methods tend to have hand-crafted, manual rankings or selections of input features [10], [15], [17], [18].…”
Section: Related Work a Traditional ML Android Malware Detection Tech...mentioning
confidence: 99%
“…1) Android Malware Detection: Early research on Android malware detection incorporates traditional machine learning approaches such as k nearest neighbors (kNN) [35], [42], [32], support vector machine (SVM) [55], [47] or Decision trees [18], [52] with manually selected features such as system calls [12], [13], permissions [39], embedded strings [10], APIs [42], [31], [53], and communication intents [48]. Later research tends to focus on deep learning algorithms and automatic feature engineering for Android malware detection.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, some work considers API sequence as the app's unique feature to detect malapps. Studies [42], [47], [53], [81], [192], [196], [236] applied API sequence to detect malapps. Studies [53], [196] employed both API and API sequence as features.…”
Section: ) Apimentioning
confidence: 99%