2020
DOI: 10.1155/2020/8630748
|View full text |Cite
|
Sign up to set email alerts
|

On-Device Detection of Repackaged Android Malware via Traffic Clustering

Abstract: Malware has become a significant problem on the Android platform. To defend against Android malware, researchers have proposed several on-device detection methods. Typically, these on-device detection methods are composed of two steps: (i) extracting the apps’ behavior features from the mobile devices and (ii) sending the extracted features to remote servers (such as a cloud platform) for analysis. By monitoring the behaviors of the apps that are running on mobile devices, available methods can detect suspicio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 50 publications
0
2
0
Order By: Relevance
“…These solutions are based solely on consumer data over cloud servers, ensuring access to mobile apps. The network communication traces enable the tracking and detection of various malware types [22]. Figure 2 describes the explainable malware detection system using transfer learning and texture features analysis.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…These solutions are based solely on consumer data over cloud servers, ensuring access to mobile apps. The network communication traces enable the tracking and detection of various malware types [22]. Figure 2 describes the explainable malware detection system using transfer learning and texture features analysis.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Different from static analysis, dynamic analysis monitors the operation of the program in real time to find and detect malicious behavior of the program. Among them, the dynamic feature includes network traffic [22,23], system calls [24][25][26], and resource consumption [27]. Vinod et al [25] proposed the Android malware detection scheme based on system calls, and the results are verified on five datasets.…”
Section: Related Workmentioning
confidence: 99%