2019
DOI: 10.1109/tdsc.2019.2909902
|View full text |Cite
|
Sign up to set email alerts
|

DBank: Predictive Behavioral Analysis of Recent Android Banking Trojans

Abstract: Using a novel dataset of Android banking trojans (ABTs), other Android malware, and goodware, we develop the DBank system to predict whether a given Android APK is a banking trojan or not. We introduce the novel concept of a Triadic Suspicion Graph (TSG for short) which contains three kinds of nodes: goodware, banking trojans, and API packages. We develop a novel feature space based on two classes of scores derived from TSGs: suspicion scores (SUS) and suspicion ranks (SR)-the latter yields a family of feature… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…Also, a detailed data-driven analysis of five prominent His ABT families was recently developed. We investigated FakeToken, Svpeng, Asacub, BankBot, and Marcher and identified the features that most differentiate them from other goodware and malware [21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Also, a detailed data-driven analysis of five prominent His ABT families was recently developed. We investigated FakeToken, Svpeng, Asacub, BankBot, and Marcher and identified the features that most differentiate them from other goodware and malware [21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The main aim of adversarial example crafting in malware detection [7,48,164,168] is to misguide the malware detection system so as to change the detection for a given application as per the desire of the attacker. Therefore, the development of secure and robust ML models is necessary to protect against the adversarial attacks.…”
Section: Adversarial Attacks -Disturbance Caused During Malware Detectionmentioning
confidence: 99%
“…Defense methodologies [7,46,48,49,190,191] can be roughly summarized as but not limited to the following:…”
Section: Defense Modellingmentioning
confidence: 99%
See 2 more Smart Citations