2020
DOI: 10.1049/iet-ifs.2019.0159
|View full text |Cite
|
Sign up to set email alerts
|

Parallel‐CNN network for malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 25 publications
0
12
0
Order By: Relevance
“…By the decompilation of classes.dex, API calls, used permissions or string features like network addresses can be extracted from disassembled java codes [76,122,209] or smali codes [57,68,113,172]. On the other hand, the source files, including APK [19,108,164,194], classes.dex [8,69,137,152], resources files [20,80], and smali codes [9,91,107,190,206], can be inputted directly as text features or bytecode features. Except the features from source files, the application information in app markets, metadata pertaining to Android application, could also be used as features [42,46,77,151].…”
Section: Static Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…By the decompilation of classes.dex, API calls, used permissions or string features like network addresses can be extracted from disassembled java codes [76,122,209] or smali codes [57,68,113,172]. On the other hand, the source files, including APK [19,108,164,194], classes.dex [8,69,137,152], resources files [20,80], and smali codes [9,91,107,190,206], can be inputted directly as text features or bytecode features. Except the features from source files, the application information in app markets, metadata pertaining to Android application, could also be used as features [42,46,77,151].…”
Section: Static Analysismentioning
confidence: 99%
“…Binary code: Apart from the disassembled codes, the raw data, binary code in APK file, can also be used as inputted features, and it is a promising solution to obfuscation techniques, like redundant API injections. Researchers convert the whole binary code or specific bytes of raw APK files into a vector of 8-bit unsigned integers [19,20,62,108,164,194].…”
Section: Static Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, deep learning based methods have recently been used for malware detection on network. In one of such studies, Bakhshinejad and Hamzeh [27 ] proposed a method for malware detection using parallel architecture of CNN.…”
Section: Related Workmentioning
confidence: 99%
“…Malware and counterfeit components can decrease performance or cause performance instability. There is a plethora of security measures that can be adopted to prevent malicious programs from being downloaded and remove them when they have been downloaded [2,3]. There are also many novel ways of detecting counterfeit hardware [4,5].…”
Section: Introductionmentioning
confidence: 99%