2020
DOI: 10.1109/access.2020.3026052
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Code Detection Based on Code Semantic Features

Abstract: With the development of smart phones, malicious applications for the Android platform have increased dramatically. The existing Android malicious code analysis methods majorly focus on detection based on signatures, inter-component communication, and other configuration information features. Such methods ignore the effect of the semantic features of the malicious code. Even a few such studies that exist are based on the statistical features of the code for malicious code detection. To address these shortcoming… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…For this purpose, graphical processing units and cloud instances can be used. Zhang and Li [167] proposed a code semantic feature-based malware detection approach.…”
Section: Android Malware Classification and Identification Usingmentioning
confidence: 99%
“…For this purpose, graphical processing units and cloud instances can be used. Zhang and Li [167] proposed a code semantic feature-based malware detection approach.…”
Section: Android Malware Classification and Identification Usingmentioning
confidence: 99%
“…Feature Vector space is segregated using clustering and later random forest applied and achieved good results. Y. Zhang [5] proposed a Graph Convolutional Network for android malware detection. A tool named "SOOT" was used for analyzing and getting data flow chains.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the approach, virtual machine memory snapshot image of running malware and benign is captured and memory images converted to grayscale images, which is used for training and testing on the CNN-based model. Zhang et al [18] present an approach for malware classification. The approach is based on data flow analysis to extract semantic structure features of the code and the graph convolutional networks (GCNs) for detection.…”
Section: Related Workmentioning
confidence: 99%