2017
DOI: 10.1007/978-3-319-64701-2_14
|View full text |Cite
|
Sign up to set email alerts
|

DNA-Droid: A Real-Time Android Ransomware Detection Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 63 publications
(44 citation statements)
references
References 15 publications
0
44
0
Order By: Relevance
“…Year Static Dynamic Machine-Learning Available Chen et al (RansomProber) [9] 2018 Cimitille et al (Talos) [11] 2017 Gharib et al (Dna-Droid) [15] 2017 Song et al [24] 2016 Zheng et al (GreatEatlon) [29] 2016 Yang et al [27] 2015 Andronio et al (HelDroid) [3] 2015 from API-calls, permissions and behavioral features [10]. Finally, Ahmadi et al proposed IntelliAV, a generic malware-oriented detector that is publicly available.…”
Section: Workmentioning
confidence: 99%
“…Year Static Dynamic Machine-Learning Available Chen et al (RansomProber) [9] 2018 Cimitille et al (Talos) [11] 2017 Gharib et al (Dna-Droid) [15] 2017 Song et al [24] 2016 Zheng et al (GreatEatlon) [29] 2016 Yang et al [27] 2015 Andronio et al (HelDroid) [3] 2015 from API-calls, permissions and behavioral features [10]. Finally, Ahmadi et al proposed IntelliAV, a generic malware-oriented detector that is publicly available.…”
Section: Workmentioning
confidence: 99%
“…Gharib et al [51] proposed a similar approach for static and dynamic analysis. They experimentally presented a framework called DNA-Droid that relies on static analysis to classify apps into suspicious, malware or trusted.…”
Section: Related Workmentioning
confidence: 99%
“…These characteristics could use dynamic features such as launching a root exploit, sending background SMS messages, CPU usage and memory usage [22,42,48,49]. User permissions were also used to indicate malicious activities for Android applications [34,41,51]. Other methods track real time system calls [13,19] and user data [49,54].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Reference [23] implemented a tool named DroidInjector, which reproduced the malicious behavior of the application through the simulation of the application behavior. Gharib [24] put forward a system named ProfileDroid, which can depict the application behavior from 2 aspects of semantics and behavior and improve the accuracy of behavior analysis. Ardeshiricham [25] then designed a more detailed system named DroidScope.…”
Section: Introductionmentioning
confidence: 99%