2016 IEEE International Conference on Communications (ICC) 2016
DOI: 10.1109/icc.2016.7511424
|View full text |Cite
|
Sign up to set email alerts
|

Behavior grouping of Android malware family

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…In addition, it requires a priori knowledge of the malware technique to monitor. Several papers have applied dynamic analysis such as [43,44,49,54,58,61]. Details on the dynamic features used by the papers were discussed in Section 4, Features.…”
Section: Dynamic Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, it requires a priori knowledge of the malware technique to monitor. Several papers have applied dynamic analysis such as [43,44,49,54,58,61]. Details on the dynamic features used by the papers were discussed in Section 4, Features.…”
Section: Dynamic Analysismentioning
confidence: 99%
“…Martin et al [44] depend on the features that are generated by a DroidBox [102] tool, an Android sandbox for dynamic analysis, which is represented as operations and function of time. In [54], the authors record the API calls that are performed during application execution. In [49], resources' consumption is utilized as features for their classification.…”
Section: Dynamic Featuresmentioning
confidence: 99%
“…They evaluated the system with 7,520 apps and obtained a detection rate of 96.66%. Hsiao et al [141] conducted malapp detection using API call sequence. Somarriba et al [154] extracted six types of APIs, such as APIs for accessing sensitive data and APIs communicating over the network.…”
Section: ) Apimentioning
confidence: 99%
“…In the face of the endless stream of Android malicious App families, how to implement a family classification for most common malicious Apps becomes a problem: as the number of malicious families increases, the malicious behaviors of different families overlap [12]. Different malware families with higher malicious similarity are more difficult to distinguish, and the accuracy of the classifier will also decrease.…”
Section: Related Workmentioning
confidence: 99%
“…Using machine learning methods to classify Android malicious Apps has achieved high accuracy [7][8][9][10][11][12]. However, due to its feature generation engineering that relies on expert knowledge, it is difficult for the above-mentioned classifiers to maintain a high accuracy rate after the changes of the malware behavior trigger method.…”
Section: Introductionmentioning
confidence: 99%