2018 4th International Conference on Recent Advances in Information Technology (RAIT) 2018
DOI: 10.1109/rait.2018.8388984
|View full text |Cite
|
Sign up to set email alerts
|

Detection of repackaged Android applications based on Apps Permissions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…However, it is justified that the intents are not an ultimate solution and should be used in conjunction with other characteristics. Similarly, Nisha et al [2] proposed the detection of repackaged Android malware using mutual information and chi-square techniques for the selection of features. Random forest classifier was able to achieve the highest accuracy of 91.76% among employed classifiers.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is justified that the intents are not an ultimate solution and should be used in conjunction with other characteristics. Similarly, Nisha et al [2] proposed the detection of repackaged Android malware using mutual information and chi-square techniques for the selection of features. Random forest classifier was able to achieve the highest accuracy of 91.76% among employed classifiers.…”
Section: Literature Reviewmentioning
confidence: 99%
“…After identifying the list of permissions, this section aims to determine the most significant permissions that can be used for distinguishing Apps from malicious and benign ones. To select the significant key permissions for malware detection, we have explored and evaluated Google's dangerous permission list [2] and the Zhu et al [9] permission set as shown in Table 2. From Table 2, it is observed that Zhu et al [9] overlapped the nine Google permission features for its evaluation while employing an additional feature named permission rate.…”
Section: Filtering Finalizing and Extracting The Core Featuresmentioning
confidence: 99%