Proceedings of the 3rd International Conference on Smart City Applications 2018
DOI: 10.1145/3286606.3286860
|View full text |Cite
|
Sign up to set email alerts
|

Permission based malware detection in android devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…However, since API calls can be manipulated, the classification of input samples may be incorrect. Ilham et al [1] and Yuan et al [17] proposed a deep learning-based extraction method of three types of features from the malware: (1) required permissions, (2) sensitive APIs, and (3) dynamic behavior. These features were then used for complex pattern and feature recogni-tion.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, since API calls can be manipulated, the classification of input samples may be incorrect. Ilham et al [1] and Yuan et al [17] proposed a deep learning-based extraction method of three types of features from the malware: (1) required permissions, (2) sensitive APIs, and (3) dynamic behavior. These features were then used for complex pattern and feature recogni-tion.…”
Section: Related Workmentioning
confidence: 99%
“…where k is the number of layers and 1) is the embedded matrix X composed of the embedded vectors corresponding to the nodes in the graph, W (k) is the weight matrix of the kth layer, and b (k) is the intercept of the kth layer. Specifically, N (v) is represented as a group of neighbors of node Ver, where Ver belongs to N (v) due to self-loops [24].…”
Section: B Malicious Code Detection Based On Deep Graph Convolutionamentioning
confidence: 99%
See 1 more Smart Citation
“…S. Ilham et al [3] proposed a system based on static analysis that follows permission-based technique. The procedure begins by first decompiling APK and then all or required application features are extracted from the source files which in the case are permissions from AndroidManifest.xml file.…”
Section: Related Workmentioning
confidence: 99%
“…The application is declared malicious based on its behavior checked while application is being executed. [3] A third technique is also popular and has proved to be more effective is formed by combining both static and dynamic techniques. An illustration of all three techniques is shown in Fig.…”
Section: Introductionmentioning
confidence: 99%