2020
DOI: 10.1007/s42044-020-00068-w
|View full text |Cite
|
Sign up to set email alerts
|

LimonDroid: a system coupling three signature-based schemes for profiling Android malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…Tchakounté et al [ 47 ] developed an analysis tool called LimonDroid to identify malicious characters in Android apps. Using Yet Another Recursive/Ridiculous Acronym (YARA) [ 32 ] rules, this tool exposed malicious characters of Metasploit, Fake Apps, LeadBolt, Ransomware, RuMMS, Viking Horde, and XBot in scanned applications.…”
Section: Security Solutions Against Mobile Malware and Threatsmentioning
confidence: 99%
“…Tchakounté et al [ 47 ] developed an analysis tool called LimonDroid to identify malicious characters in Android apps. Using Yet Another Recursive/Ridiculous Acronym (YARA) [ 32 ] rules, this tool exposed malicious characters of Metasploit, Fake Apps, LeadBolt, Ransomware, RuMMS, Viking Horde, and XBot in scanned applications.…”
Section: Security Solutions Against Mobile Malware and Threatsmentioning
confidence: 99%
“…3 presents the three main categories of Android malware detection techniques, the first category is logic-based techniques ( Lee et al, 2014 ; Zhang, She & Qian, 2015a ), based on hard-coded safe lists and predefined alarms stored in text files or a small database like Amamra ( Amamra, Robert & Talhi, 2015 ). The second category is signature based malware detection techniques ( Niazi et al, 2015 ; Tchakounté et al, 2021 ), it based the malware detection on comparing the suspicious application with malware application signature. The third category of Android malware detection uses machine learning (ML) classification algorithms to classify the application as benign or malware ( Afonso et al, 2015 ; Alzaylaee, Yerima & Sezer, 2016 ; Amamra, Robert & Talhi, 2015 ; Baskaran & Ralescu, 2016 ; Canfora et al, 2016 ; Canfora et al, 2015c ; Castellanos et al, 2016 ; Faruki et al, 2015a ; Feizollah et al, 2015 ; Fratantonio et al, 2016 ; Kurniawan, Rosmansyah & Dabarsyah, 2015 ; Lei et al, 2015 ; Lindorfer, Neugschwandtner & Platzer, 2015 ; Lopez & Cadavid, 2016 ; Meng et al, 2016 ; Nissim et al, 2016 ; Spreitzenbarth et al, 2015 ; Spreitzer et al, 2016 ; Wang & Wu, 2015 ; Wu et al, 2016 ; Xu et al, 2016 ; Yerima, Sezer & Muttik, 2014 ; Yuan, Lu & Xue, 2016 ; Zhang, Breitinger & Baggili, 2016 ).…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…This model has limitations where each of the new malware family variants needs a different signature. LimonDroid ( Tchakounté et al, 2021 ) proposed a signature-based database of Android malware signature based on fuzzy hashing technique. It builds a signature database for literature purposes rather than a malware detection framework.…”
Section: Evasion Techniquesmentioning
confidence: 99%
“…This limitation is overcome in dynamic analysis [13], by scrutinizing data flows involved during runtime, which are helpful to identify malicious paths. Hybrid analysis [49,50] takes advantage of compromise between static and dynamic analysis and switch from one to another based on contexts. Unlike these works, we are about looking for reviews to evaluate and improve security-related health of apps on Google Play.…”
Section: Security Of Android Appsmentioning
confidence: 99%