2019
DOI: 10.1109/access.2019.2951751
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Malicious Software Using Deep Residual Long-Short Term Memory

Abstract: The use of smartphone applications based on the Android OS platform is rapidly growing among smartphone users. However, malicious apps for Android are being developed to perform attacks, such as destroying operating systems, stealing confidential data, gathering personal information, and hijacking or encrypting sensitive data. Several malware detection systems based on machine learning have been developed and deployed to extract a variety of features to prevent such attacks. However, new efficient detection me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(9 citation statements)
references
References 47 publications
0
9
0
Order By: Relevance
“…If the expressions and constraints of an application are in this rule library, this application will be considered as a malicious application. For example, to reduce the high false- [15], [16], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [94], [95], [98], [99], [100], [101], [102], [105], [109], [111],…”
Section: ) Publication Sourcementioning
confidence: 99%
“…If the expressions and constraints of an application are in this rule library, this application will be considered as a malicious application. For example, to reduce the high false- [15], [16], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [39], [40], [41], [42], [43], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54], [55], [56], [57], [58], [59], [60], [61], [62], [63], [64], [94], [95], [98], [99], [100], [101], [102], [105], [109], [111],…”
Section: ) Publication Sourcementioning
confidence: 99%
“…Alotaibi, A. [17] proposed the MalResLSTM framework that is based on deep residual long short-term memory(LSTM) and also uses information in the manifest file, API calls and network addresses as features. These features are embedded in a vector space using one-hot encoding.…”
Section: Related Workmentioning
confidence: 99%
“…Detection accuracy of 98% and 63% was achieved for small size families' malware and zero day malwares respectively. In MalResLSTM 22 , authors presented Long Short Term Memory(LSTM) based method to classify malapps. Feature extracted were mapped to vector space and processed in the LSTM based deep learning model to achieve the accuracy of 99.32%.…”
Section: Multiple Features and Multiple Classifiersmentioning
confidence: 99%