2021
DOI: 10.35940/ijeat.e2593.0610521
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Based Detection of Android Malware using Ranked Permissions

Abstract: Android mobile devices are a prime target for a huge number of cyber-criminals as they aim to create malware for disrupting and damaging the servers, clients, or networks. Android malware are in the form of malicious apps, that get downloaded on mobile devices via the Play Store or third-party app markets. Such malicious apps pose serious threats like system damage, information leakage, financial loss to user, etc. Thus, predicting which apps contain malicious behavior will help in preventing malware attacks o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 43 publications
0
1
0
Order By: Relevance
“…Therefore, the number of Android applications is considerable. Correspondingly, Android malware is also flooding the third-party application market, bringing unprecedented challenges to information security [2][3][4]. At present, researchers mainly adopt static and dynamic methods to analyze Android malware.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the number of Android applications is considerable. Correspondingly, Android malware is also flooding the third-party application market, bringing unprecedented challenges to information security [2][3][4]. At present, researchers mainly adopt static and dynamic methods to analyze Android malware.…”
Section: Introductionmentioning
confidence: 99%