2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883436
|View full text |Cite
|
Sign up to set email alerts
|

Using opcode-sequences to detect malicious Android applications

Abstract: Abstract-Recently, the Android platform has seen its number of malicious applications increased sharply. Motivated by the easy application submission process and the number of alternative market places for distributing Android applications, rogue authors are developing constantly new malicious programs. While current anti-virus software mainly relies on signature detection, the issue of alternative malware detection has to be addressed. In this paper, we present a feature based detection mechanism relying on o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
74
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 72 publications
(75 citation statements)
references
References 22 publications
1
74
0
Order By: Relevance
“…Moreover, the table shows that, in order to achieve the same accuracy value, greater values of n need greater values of k. This aspect is consistent with the findings of [22]. A possible interpretation of this finding is that ngrams greater than 2 may be too specific and thus the classifier tends to overfit.…”
Section: B Experimental Procedures and Resultssupporting
confidence: 80%
See 1 more Smart Citation
“…Moreover, the table shows that, in order to achieve the same accuracy value, greater values of n need greater values of k. This aspect is consistent with the findings of [22]. A possible interpretation of this finding is that ngrams greater than 2 may be too specific and thus the classifier tends to overfit.…”
Section: B Experimental Procedures and Resultssupporting
confidence: 80%
“…Jerome and colleagues [22] proposed a detection mechanism relying on opcode sequences combined with machine learning techniques. They obtain lower performances of detection than our technique and with sequences longer than bi-grams.…”
Section: Related Workmentioning
confidence: 99%
“…They tested libsvm and SVM classifier with the reduced data set (11,960 malware and 12,905 benign applications) and obtained 0.89% F-measure. However, their approach is not capable to detect completely different malware [15]. Kevin Allix et al [3] devised classifiers that depend on the features set that are designed from the apps control flow graphs.…”
Section: Detection Of Android Malicious Appsmentioning
confidence: 99%
“…Applications are often attributed to their developers using certificates tied to the developer's signing credentials, although investigating certificate's information has not been actively studied yet. Very recently, Jerome et al [23] used certificates signing malware to isolate applications as a potential malware set, which showed the possibility of filtering malware with a predefined list of malicious certificates. We hypothesized that certain developers have a significant role in the creation and distribution of malicious apps.…”
Section: Introductionmentioning
confidence: 99%