2021
DOI: 10.1109/access.2021.3090998
|View full text |Cite
|
Sign up to set email alerts
|

Classification and Analysis of Android Malware Images Using Feature Fusion Technique

Abstract: The super packed functionalities and artificial intelligence (AI)-powered applications have made the Android operating system a big player in the market. Android smartphones have become an integral part of life and users are reliant on their smart devices for making calls, sending text messages, navigation, games, and financial transactions to name a few. This evolution of the smartphone community has opened new horizons for malware developers. As malware variants are growing at a tremendous rate every year, t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(28 citation statements)
references
References 48 publications
0
28
0
Order By: Relevance
“…For instance, work in [1,2,3] proposes use of call graphs, system calls, and explainable Artificial Intelligence (AI) methods for improving classification & localization performance under real-time cyber physical systems. Similar models are discussed in [4,5,6 [10], and Metamorphic Malware detection via Genetic Algorithm (MMGA) [11] are discussed by researchers. These models utilize large-scale & high-density feature extraction techniques in order to improve accuracy of detection & localization of malwares with different signatures.…”
Section: Literature Reviewmentioning
confidence: 95%
“…For instance, work in [1,2,3] proposes use of call graphs, system calls, and explainable Artificial Intelligence (AI) methods for improving classification & localization performance under real-time cyber physical systems. Similar models are discussed in [4,5,6 [10], and Metamorphic Malware detection via Genetic Algorithm (MMGA) [11] are discussed by researchers. These models utilize large-scale & high-density feature extraction techniques in order to improve accuracy of detection & localization of malwares with different signatures.…”
Section: Literature Reviewmentioning
confidence: 95%
“…In [ 120 ], it is proposed to visualize malicious Android applications and then classify the obtained images. SVM, KNN, and Random Forest are used for this purpose.…”
Section: Systematization Of Sa Stages and ML Solutionsmentioning
confidence: 99%
“…Maria et al [11] extracted Speeded Up Robust Features (SURF) and Histogram of Oriented Gradients (HOG) from malware gray image. Singh et al [12] exacted Gray Level Co-occurrence Matrix-based (GLCM), Global Image Descriptors (GIST), and Local Binary Pattern (LBP) from malware gray image. However, these methods still extracted information from the original gray image, and did not enhance the image in essence.…”
Section: Vision-based Analysismentioning
confidence: 99%