2015
DOI: 10.1016/j.cose.2014.11.001
|View full text |Cite
|
Sign up to set email alerts
|

Profiling user-trigger dependence for Android malware detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0
2

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 102 publications
(54 citation statements)
references
References 3 publications
0
52
0
2
Order By: Relevance
“…As a result, techniques for detecting Android malware are readily available [17,30]. These can be categorised into two main groups: static and dynamic.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, techniques for detecting Android malware are readily available [17,30]. These can be categorised into two main groups: static and dynamic.…”
Section: Related Workmentioning
confidence: 99%
“…As a result techniques for detecting Android malware are largely available [4,5], but most of them target single malicious apps. The notion of collusion has recently been discussed in many research papers.…”
Section: Related Workmentioning
confidence: 99%
“…The use of examples thus elevates the need to explicitly state the rules for the classification by the user [37]. Here we use Bayesian fusion -well known log likelihood model 4 for this purpose. Bayesian fusion has been widely used in intrusion detection [39,40].…”
Section: Data Drivenmentioning
confidence: 99%
“…Experiments show that DroidSIFT's method can achieve high accuracy on both known and zero-day malicious applications. In [22], the authors extracted data-flow features for users' trigger sensitive APIs and built a program called TriggerMetric that captures the data dependence relations between a user's actions and sensitive operations. The values of TriggerMetric reflect the degree of sensitive operations that are triggered or intended by the users.…”
Section: Static Detectionmentioning
confidence: 99%