2013
DOI: 10.1002/sec.675
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play)

Abstract: Recent smartphone platforms based on new operating systems, such as iOS, Android, or Windows Phone, have been a huge success in recent years and open up many new opportunities. Unfortunately, 2011 also showed us that the new technologies and the privacy‐related data on smartphones are also increasingly interesting for attackers. Especially, the Android platform has been the favorite target for malware, mainly because of the openness of the platform, the ability to install applications from other sources than t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(16 citation statements)
references
References 13 publications
0
15
0
1
Order By: Relevance
“…Teufl et al [218] mined 130,211 apps from Google Play and performed clustering on both app descriptions and requested permissions, as part of their activation patterns malware detection approach. They later extended this work [217] to propose a first-step malware detection method using links between description terms and security permissions to identify suspicious outliers. In 2013 Mokarizadeh et al [166] performed clustering on 21,065 apps, mined from Google Play, after applying topic modelling on app descriptions.…”
Section: Clusteringmentioning
confidence: 99%
“…Teufl et al [218] mined 130,211 apps from Google Play and performed clustering on both app descriptions and requested permissions, as part of their activation patterns malware detection approach. They later extended this work [217] to propose a first-step malware detection method using links between description terms and security permissions to identify suspicious outliers. In 2013 Mokarizadeh et al [166] performed clustering on 21,065 apps, mined from Google Play, after applying topic modelling on app descriptions.…”
Section: Clusteringmentioning
confidence: 99%
“…have also been used to distinguish between malicious and benign apps. Droidmat [70] uses API call tracing and manifest files to learn features for malware detection, Teufl et al [62] apply knowledge discovery processes and lean statistical methods on app metadata extracted from the app market, while [25] rely on embedded call graphs. DroidMiner [73] studies the program logic of sensitive Android/Java framework API functions and resources, and detects malicious behavior patterns.…”
Section: Android Malware Detectionmentioning
confidence: 99%
“…As smartphones have become a major target for attackers, various research studies have focused on the detection of malware from market [8,10]. There are also some studies discussing recommender and rating systems [3,7].…”
Section: Related Workmentioning
confidence: 99%