Results 1 to 10 of about 551 (95)
Automated Android Malware Detection Using User Feedback. [PDF]
The widespread usage of mobile devices and their seamless adaptation to each user’s needs through useful applications (apps) makes them a prime target for malware developers. Malware is software built to harm the user, e.g., to access sensitive user data, such as banking details, or to hold data hostage and block user access. These apps are distributed
Duque J +4 more
europepmc +5 more sources
Z2F: Heterogeneous graph-based Android malware detection. [PDF]
Android malware is becoming more common, and its invasion of smart devices has brought immeasurable losses to people’s lives. Most existing Android malware detection methods extract Android features from the original application files without considering the high-order hidden information behind them, but these hidden information can reflect malicious ...
Ma Z, Luktarhan N.
europepmc +4 more sources
Trends in Android Malware Detection [PDF]
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and
Kaveh Shaerpour +2 more
openaire +4 more sources
Deep Android Malware Detection [PDF]
In this paper, we propose a novel android malware detection system that uses a deep convolutional neural network (CNN). Malware classification is performed based on static analysis of the raw opcode sequence from a disassembled program. Features indicative of malware are automatically learned by the network from the raw opcode sequence thus removing ...
McLaughlin, Niall; id_orcid 0000-0002-0917-9145 +10 more
openaire +4 more sources
Explaining Black-box Android Malware Detection [PDF]
Machine-learning models have been recently used for detecting malicious Android applications, reporting impressive performances on benchmark datasets, even when trained only on features statically extracted from the application, such as system calls and permissions.
Marco Melis +4 more
openaire +4 more sources
Android Malware Detection Using Deep Learning
This chapter investigates the potential of deep learning architectures for Android malware detection, specifically convolutional neural networks (CNNs) using natural language processing (NLP) concepts. The proposed solution is based on static analysis of raw opcode sequences from disassembled programs and other complementary features such as API calls ...
Millar, Stuart +3 more
openaire +3 more sources
Android malware detection: a survey [PDF]
Android has become the most popular mobile operating system in the past ten years due to its three main advantages, namely, the openness of source code, richness of hardware selection, and millions of applications (apps). It is of no surprise that Android has become the major target of malware.
Le YU +5 more
openaire +1 more source
Android malware detection based on sensitive patterns
Abstract In recent years, the rapid increase in the number and type of Android malware has brought great challenges and pressure to malware detection systems. As a widely used method in android malware detection, static detecting has been a hot topic in academia and industry.
Kang Liu +5 more
openaire +1 more source
Smart malware detection on Android [PDF]
AbstractNowadays, because of its increased popularity, Android is target to a growing number of attacks and malicious applications, with the purpose of stealing private information and consuming credit by subscribing to premium services. Most of the current commercial antivirus solutions use static signatures for malware detection, which may fail to ...
Laura Gheorghe +6 more
openaire +1 more source
Android Fragmentation in Malware Detection
Abstract Differences between Android versions affect not only application developers but also make the task of securing Android harder, as it is not easy to keep track of updates. In this paper, we first systematically analyze the Android framework, which includes APIs and enforced manifest permissions to realize the inconsistency currently exists in
Long Nguyen-Vu, Jinung Ahn, Souhwan Jung
openaire +1 more source

