2014
DOI: 10.1007/978-3-319-12280-9_13
|View full text |Cite
|
Sign up to set email alerts
|

Mining API Calls and Permissions for Android Malware Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(30 citation statements)
references
References 7 publications
0
29
0
1
Order By: Relevance
“…Sharma and Dash [16] utilized API calls and permissions to build Naive Bayes and k-NN based detection systems. In [17], API classes were used with Random Forest, J48 and SVM classifiers.…”
Section: A Static Analysis With Traditional Classifiersmentioning
confidence: 99%
“…Sharma and Dash [16] utilized API calls and permissions to build Naive Bayes and k-NN based detection systems. In [17], API classes were used with Random Forest, J48 and SVM classifiers.…”
Section: A Static Analysis With Traditional Classifiersmentioning
confidence: 99%
“…Learning based approaches using hand-designed features have been applied extensively to both dynamic [1][2][3], [18][19][20] 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 13-14 June, 2016 London, United Kingdom and static [6,7,8,22] malware detection. For example, the authors of [7] studied a static analysis approach to Android malware detection based on 179 features manually derived from API calls, intents, permissions and commands that were combined with ensemble learning.…”
Section: Related Workmentioning
confidence: 99%
“…Their approach was evaluated on a dataset of 2925 malware apps and 3938 benign apps. A variety of similar approaches to static malware detection have used similarly derived features, but with different classifiers such as support vector machine (SVM) [12], Naïve Bayes [17], and k-nearest neighbor [6]. Malware detection approaches have also been proposed that use static features derived exclusively from the permissions requested by the application [4,5].…”
Section: Related Workmentioning
confidence: 99%
“…However, the existence of some permission is not sufficient evidence to classify the App as malware, as most of the permissions requested by goodware apps are also requested by malware apps. Moreover, the permissions stated in the Android-Manifest.xml are not necessarily employed by the App [8,9]. Several researches considered the API call used in the apps' code to differentiate between malware and goodware apps [10,11,12,13,14].…”
Section: Introductionmentioning
confidence: 99%