2023
DOI: 10.17559/tv-20220907113227
|View full text |Cite
|
Sign up to set email alerts
|

Deep Learning based Malware Detection for Android Systems: A Comparative Analysis

Abstract: Nowadays, cyber attackers focus on Android, which is the most popular open-source operating system, as main target by applying some malicious software (malware) to access users' private information, control the device, or harm end-users. To detect Android malware, security experts have offered some learning-based models. In this study, we developed an Android malware detection system that uses different machine\deep learning models by performing both dynamic analyses, in which suspected malware is executed in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Due to the diversity of the extracted information, the features that need to be used to use the categorized data in learning-based attack detection usually need to be transformed into a vectorized representation. In studies in the literature, APKs are processed and analyzed first, and then processing is carried out on the information extracted from the applications [15], [20], [38].…”
Section: Android Malware Analysis Techniquesmentioning
confidence: 99%
See 3 more Smart Citations
“…Due to the diversity of the extracted information, the features that need to be used to use the categorized data in learning-based attack detection usually need to be transformed into a vectorized representation. In studies in the literature, APKs are processed and analyzed first, and then processing is carried out on the information extracted from the applications [15], [20], [38].…”
Section: Android Malware Analysis Techniquesmentioning
confidence: 99%
“…Additionally, MD5 check sums or hashes can be used to compare malware against a database of known malicious software. This approach offers a quick and cost-effective means of identifying harmful features and code in an application before it runs [40], [20]. Below, we describe some of the methods used in the static analysis approach to detect malware, including code analysis, API calls, and permissions.…”
Section: A Static Anaysismentioning
confidence: 99%
See 2 more Smart Citations