2020
DOI: 10.1016/j.future.2019.11.034
|View full text |Cite
|
Sign up to set email alerts
|

Similarity-based Android malware detection using Hamming distance of static binary features

Abstract: In this paper, we develop four malware detection methods using Hamming distance to find similarity between samples which are first nearest neighbors (FNN), all nearest neighbors (ANN), weighted all nearest neighbors (WANN), and k-medoid based nearest neighbors (KMNN). In our proposed methods, we can trigger the alarm if we detect an Android app is malicious. Hence, our solutions help us to avoid the spread of detected malware on a broader scale. We provide a detailed description of the proposed detection metho… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
77
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 156 publications
(84 citation statements)
references
References 29 publications
0
77
0
Order By: Relevance
“…Therefore, all the original traces need to be transformed into vectors before feeding them to the target classifiers. We adopt the set of words technique to preprocess the original traces because it is widely applied in cybersecurity [23], [35], [36]. Assuming that C = {c 1 , c 2 , c 3 , .…”
Section: A Crafting Adversarial Examples Against Machine Learning Bamentioning
confidence: 99%
“…Therefore, all the original traces need to be transformed into vectors before feeding them to the target classifiers. We adopt the set of words technique to preprocess the original traces because it is widely applied in cybersecurity [23], [35], [36]. Assuming that C = {c 1 , c 2 , c 3 , .…”
Section: A Crafting Adversarial Examples Against Machine Learning Bamentioning
confidence: 99%
“…The last aspect is a major challenge since it preserves confidentiality, integrity and availability of user data. On Android, most of the approaches static analysis relying static features related to applications [4][5][6][7][8], dynamic analysis relying on features observed during their execution [9][10][11] and hybrid analysis combining the both [12][13][14]. Despite Google Play Protect provided by Google, to filter threats, there are still malicious applications carefully designed by bad people to have an impact on the security and privacy of users [5,15].…”
Section: Introductionmentioning
confidence: 99%
“…As for any social ecosystem, an application (seen as an agent) should be associated with a reputation score to predict bad behaviors [22]. Returning to Android, reputation can be evaluated based on permissions requests [23][24][25] Application Programming Interface (API) calls [5], information flow analysis [26,27] and other features [6]. These approaches require prior installation and are based on app features.…”
Section: Introductionmentioning
confidence: 99%
“…The providing factors of this usage have been the convenience of the devices with their developing capacity and power, and portability. It is estimated that the number of mobile devices has increased by nearly twice as compared to 2014 [1]. Android operating system is one of the commonly used mobile OS leading this raise.…”
Section: Introductionmentioning
confidence: 99%
“…Besides, the variety of malicious software has been constantly arising in the Android mobile networks, which poses a risk to end users. Unlike the IOS, users can download the applications from shared files in third-party distribution environments as well as the Play Store [1]. Malevolent application detection tools are needed to help Android users cope with these security problems.…”
Section: Introductionmentioning
confidence: 99%