2016
DOI: 10.1007/s11416-016-0277-z
|View full text |Cite
|
Sign up to set email alerts
|

Identification of malicious android app using manifest and opcode features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(24 citation statements)
references
References 28 publications
0
24
0
Order By: Relevance
“…The machine learning based detection proposed in the papers were based on API calls, intents, permissions and embedded commands. Varsha et al [15] investigated SVM, Random Forest and Rotation Forests on three datasets; their detection method employed static features extracted from the manifest and application executable files.…”
Section: A Static Analysis With Traditional Classifiersmentioning
confidence: 99%
“…The machine learning based detection proposed in the papers were based on API calls, intents, permissions and embedded commands. Varsha et al [15] investigated SVM, Random Forest and Rotation Forests on three datasets; their detection method employed static features extracted from the manifest and application executable files.…”
Section: A Static Analysis With Traditional Classifiersmentioning
confidence: 99%
“…Wang et al [26] applied SVM, decision trees and random forest to analyse the use of vulnerable permissions for malware detection. Varsha et al [27] extricate static features from the manifest and application executable documents; their location strategy gave SVM, rotation forest and random forest on three datasets. DAPASA [28] used sensitive sub-graphs to construct five features depicting invocation patterns, random forest machine learning algorithm achieved the best detection performance.…”
Section: Static Analysismentioning
confidence: 99%
“…Some recent works have applied static opcode features to the problem of Android malware detection (Jerome et al, 2014;Kang et al, 2013;Canfora et al, 2015a;Canfora et al, 2015b;Varsha et al, 2016;Puerta et al, 2015;Canfora et al 2015c). Out of these, only Jerome et al, (2014) and Canfora et al, (2015a) have investigated n-gram extracted from the disassembled application bytecode as a means for Android malware detection.…”
Section: Introductionmentioning
confidence: 99%