2015
DOI: 10.1016/j.diin.2015.01.001
|View full text |Cite
|
Sign up to set email alerts
|

APK Auditor: Permission-based Android malware detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
82
0
2

Year Published

2016
2016
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 213 publications
(84 citation statements)
references
References 5 publications
0
82
0
2
Order By: Relevance
“…Commonly, Android applications are investigated by analyzing the AndroidManifest.xml, the DEX file or both (Talha et al, 2015). The XML-file processing is straightforward e convert binary into text and parse it.…”
Section: Related Workmentioning
confidence: 99%
“…Commonly, Android applications are investigated by analyzing the AndroidManifest.xml, the DEX file or both (Talha et al, 2015). The XML-file processing is straightforward e convert binary into text and parse it.…”
Section: Related Workmentioning
confidence: 99%
“…Permissions are actively granted by the user when an app is installed, and they are mainly used to limit the use of some functions and the access to some components among apps. In previous research works [22,23], Android malware would request some particular permissions more frequently than benign samples. For example, majority of malware would request the SEND SMS permission to send out premium SMS messages.…”
Section: Android Apps Profilingmentioning
confidence: 99%
“…Authors demonstrate accuracy as high as 99% for SVM, Decision Tree, and Random Forest under specific configuration using a high volume data set. In the same mind-set, the APK Auditor [17] relies on logistic regression, while evaluates its performance using a dataset of 6900 malware and 1850 benign apps. Results indicate accuracy up to 88%.…”
Section: Permissionsmentioning
confidence: 99%