2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2019
DOI: 10.1109/ase.2019.00023
|View full text |Cite
|
Sign up to set email alerts
|

MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(24 citation statements)
references
References 33 publications
0
23
0
1
Order By: Relevance
“…-DroidCat, which was published in the TIFS journal in 2019 by Cai et al (2019) and has collected more than 30 citations. -MalScan, the most recent identified approach, which has been presented at ASE in 2019 by Wu et al (2019).…”
Section: This Papermentioning
confidence: 99%
See 1 more Smart Citation
“…-DroidCat, which was published in the TIFS journal in 2019 by Cai et al (2019) and has collected more than 30 citations. -MalScan, the most recent identified approach, which has been presented at ASE in 2019 by Wu et al (2019).…”
Section: This Papermentioning
confidence: 99%
“…We now describe our journey to reproduce five approaches identified from the literature. First, we present the selection criteria, which eventually led to the identification of DREBIN (Arp et al 2014), MaMaDroid (Mariconti et al 2017), RevealDroid (Garcia et al 2018), DroidCat (Cai et al 2019), and MalScan (Wu et al 2019). Then, for each reproduction subject, we (1) introduce the approach, (2) describe how we reproduce the building blocks of the machine learning approach, and (3) quantitatively compare the results obtained based on our reproduction against the results presented in the original publication.…”
Section: Reproductionmentioning
confidence: 99%
“…Therefore, they were not used as a whole in many works [23] [39] [16]. Of such works, [39] use centrality measures of API methods, while [16] use graphlet frequency distribution as the feature vectors. Classifiers were trained with these feature vectors to detect Android malware.…”
Section: Related Workmentioning
confidence: 99%
“…Androguard can be used both as a command line tool and an imported package for python scripts. A large portion of Android malware detection systems incorporate Androguard [3,4,14,19,26,27,38,48,39,69,72,80,84,96,100,101,103,122,124,136,137,142,143]. When analyzing an APK, Androguard efficiently extracts features such as API calls, CFG graph, permissions, Activities, Package names, etc.…”
Section: Androguardmentioning
confidence: 99%