2020
DOI: 10.1007/s00521-020-05195-w
|View full text |Cite
|
Sign up to set email alerts
|

VisDroid: Android malware classification based on local and global image features, bag of visual words and machine learning techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
3

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(23 citation statements)
references
References 33 publications
0
20
0
3
Order By: Relevance
“…Malware can be labeled certain categories by analyzing their behaviors and objectives, and hence, identifying the family types of malicious software is beneficial for further analysis and proposing protection strategies. 14 studies formulate the malware family prediction task as multi-classification to classify one sample into the families that the sample likely belongs to [18,20,49,76,108,113,120,121,127,132,152,164,190,206], while Zhang et al present a hybrid representation learning approach to clustering weakly-labeled malware to corresponding families [202]. Except for existing defined family types like Ransomware, zero-day family malware is an emerging issue, posing new challenges for welltrained models due to the lack of knowledge.…”
Section: Results Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Malware can be labeled certain categories by analyzing their behaviors and objectives, and hence, identifying the family types of malicious software is beneficial for further analysis and proposing protection strategies. 14 studies formulate the malware family prediction task as multi-classification to classify one sample into the families that the sample likely belongs to [18,20,49,76,108,113,120,121,127,132,152,164,190,206], while Zhang et al present a hybrid representation learning approach to clustering weakly-labeled malware to corresponding families [202]. Except for existing defined family types like Ransomware, zero-day family malware is an emerging issue, posing new challenges for welltrained models due to the lack of knowledge.…”
Section: Results Analysismentioning
confidence: 99%
“…By the decompilation of classes.dex, API calls, used permissions or string features like network addresses can be extracted from disassembled java codes [76,122,209] or smali codes [57,68,113,172]. On the other hand, the source files, including APK [19,108,164,194], classes.dex [8,69,137,152], resources files [20,80], and smali codes [9,91,107,190,206], can be inputted directly as text features or bytecode features. Except the features from source files, the application information in app markets, metadata pertaining to Android application, could also be used as features [42,46,77,151].…”
Section: Static Analysismentioning
confidence: 99%
“…It is important to highlight that during the last years we have witnessed a flourishing of online tools enabling digital services' owners to generate, in a handful of clicks, their ToS 4 . Therefore, we can argue that is plausible a significant part of clauses can be very similar in ToS across a wide range of online services.…”
Section: Clauses Representationmentioning
confidence: 99%
“…• We propose a novel machine learning-based approach to classify clauses in ToS, represented by using sentence embedding, into both categories and fairness classes (a legally determined concept that is much more complex but also growingly relevant in data mining research [23]). Support Vector Machine (for clauses' categories) and Random Forest (for clauses' fairness levels) resulted to be the most suitable methods for our specific problem after a comparing phase with other widely adopted classifiers [4,43]. As a result, we obtained a F1-score of 86% in classifying the clauses into (a predefined set of) categories and up to 81% in classifying them according their level of fairness, i.e., potentially unfair and fair clauses.…”
Section: Introductionmentioning
confidence: 98%
“…For instance, in the KNN approach, a sample is classified to family f1 if it has k-nearest neighbors belonging to family f1. It is to be noted that many solutions leveraging machine learning and big data techniques are appearing to develop malware detection models [153][154][155]. Computer vision techniques have been becoming popular among the research communities to detect and classify malware applications [156,157].…”
Section: Module IIImentioning
confidence: 99%