2019
DOI: 10.5755/j01.itc.48.2.21457
|View full text |Cite
|
Sign up to set email alerts
|

What Static Analysis Can Utmost Offer for Android Malware Detection

Abstract: Malicious applications are widespread for Android despite the taken serious actions by the operating system. Static and dynamic analysis techniques are utilized to detect malware by identifying the signatures of malicious applications by inspecting both the resources and behaviors of malware, respectively. In this study, what static analysis can utmost offer to detect malware in Android ecosystem is discussed and experimented on commonly used datasets in the literature by proposing a novel Android malware dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 66 publications
(95 reference statements)
0
11
0
2
Order By: Relevance
“…In Refs. [109], [115], and [136]- [147] in Table 4, only the information gain (mutual information) is selected as the index to evaluate the generated feature subset. Information measures are a non-parametric and non-linear evaluation standard that do not depend on the distribution of the sample data, and therefore they are widely used in feature selection.…”
Section: Data Transformationmentioning
confidence: 99%
See 3 more Smart Citations
“…In Refs. [109], [115], and [136]- [147] in Table 4, only the information gain (mutual information) is selected as the index to evaluate the generated feature subset. Information measures are a non-parametric and non-linear evaluation standard that do not depend on the distribution of the sample data, and therefore they are widely used in feature selection.…”
Section: Data Transformationmentioning
confidence: 99%
“…Lastly, Ref. [147] establishes the static feature set from the perspective of quantity, including the number of multiple objects such as lines of code (loc), permissions, and activities.…”
Section: ) Static Featuresmentioning
confidence: 99%
See 2 more Smart Citations
“…The related works are summarized in Table 1. Here, the static analysis uses only static resources, which are available before the installation and execution of malicious applications [40].…”
Section: Related Workmentioning
confidence: 99%