2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) 2016
DOI: 10.1109/cybersecpods.2016.7502343
|View full text |Cite
|
Sign up to set email alerts
|

N-opcode analysis for android malware classification and categorization

Abstract: Malware detection is a growing problem particularly on the Android mobile platform due to its increasing popularity and accessibility to numerous third party app markets. This has also been made worse by the increasingly sophisticated detection avoidance techniques employed by emerging malware families. This calls for more effective techniques for detection and classification of Android malware. Hence, in this paper we present an n-opcode analysis based approach that utilizes machine learning to classify and c… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
54
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 75 publications
(56 citation statements)
references
References 21 publications
0
54
0
2
Order By: Relevance
“…In the static analysis approach, the code is usually reverse engineered and examined for presence of any malicious code. [24][25][26][27][28][29][30][31][32][33][34] are examples of detection solutions based on static analysis. Dynamic analysis on the other hand, involves executing apps in a controlled environment such as a sandbox, virtual machine, or a physical device in order to trace its behavior.…”
Section: Related Workmentioning
confidence: 99%
“…In the static analysis approach, the code is usually reverse engineered and examined for presence of any malicious code. [24][25][26][27][28][29][30][31][32][33][34] are examples of detection solutions based on static analysis. Dynamic analysis on the other hand, involves executing apps in a controlled environment such as a sandbox, virtual machine, or a physical device in order to trace its behavior.…”
Section: Related Workmentioning
confidence: 99%
“…It was evaluated on 1386 benign apps and 1296 malapps achieving a detection accuracy of up to 98.4%. Some papers such as [10], [11], [12], [29] and [30], employ static analysisbased opcode features with machine learning for Android malware detection. Other papers utilize tools such as Droidbox [13] or Dynalog [14] to extract dynamic features [15] for training machine learning based classifiers.…”
Section: Related Workmentioning
confidence: 99%
“…The authors from [19] aimed at utilizing the benefits of the n-gram based approaches while trying to minimize the dimensionality of the feature input space by evaluating the relative importance of the various extracted n-grams. [11] used a similar strategy and extract n-grams of operation codes from binaries, which are then used for detection.…”
Section: Overview Of Malware Detectionmentioning
confidence: 99%
“…In this paper, we compare our deep learning based detector's functionality with a benchmark detector that we implemented, which is closely related, in terms of the principles used, to the works like [25], [11] and [27]. In the work of [24], the authors work with multiple extracted features form binaries, some of which revolve around the notion of capturing structure-related attributes of binaries by collecting n-gram based statistics.…”
Section: A Related Workmentioning
confidence: 99%