Android malware analysis approach based on control flow graphs and machine learning algorithms

作者: Mehmet Ali Atici , Seref Sagiroglu , Ibrahim Alper Dogru

DOI: 10.1109/ISDFS.2016.7473512

关键词: Mobile deviceStatic analysisAndroid (operating system)Control flowMachine learningEncryptionArtificial intelligenceComputer scienceAlgorithmMalwareMobile malwareWearable computer

摘要: … To improve the success of mobile malware detection it is suggested that detection should be … As for the future worN, by using the advantage of representing the java methods of malware …

参考文章(23)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Silvio Cesare, Yang Xiang, Classification of malware using structured control flow AusPDC '10 Proceedings of the Eighth Australasian Symposium on Parallel and Distributed Computing - Volume 107. pp. 61- 70 ,(2010)
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Suleiman Y. Yerima, Gavin McWilliams, Sakir Sezer, Analysis of Bayesian classification-based approaches for Android malware detection Iet Information Security. ,vol. 8, pp. 25- 36 ,(2014) , 10.1049/IET-IFS.2013.0095
S. Y. Yerima, S. Sezer, G. McWilliams, I. Muttik, A New Android Malware Detection Approach Using Bayesian Classification advanced information networking and applications. pp. 121- 128 ,(2013) , 10.1109/AINA.2013.88
Tong Shen, Yibing Zhongyang, Zhi Xin, Bing Mao, Hao Huang, Detect Android Malware Variants Using Component Based Topology Graph trust security and privacy in computing and communications. pp. 406- 413 ,(2014) , 10.1109/TRUSTCOM.2014.52
Leszek Rutkowski, Maciej Jaworski, Lena Pietruczuk, Piotr Duda, The CART decision tree for mining data streams Information Sciences. ,vol. 266, pp. 1- 15 ,(2014) , 10.1016/J.INS.2013.12.060
Mohammed J. Islam, Q. M. Jonathan Wu, Majid Ahmadi, Maher A. Sid-Ahmed, Computational Identification of Interaction Motifs in Hepatitis C Virus NS5A and Human Proteins international conference on convergence information technology. pp. 1541- 1546 ,(2007) , 10.1109/ICCIT.2007.148
Kabakus Abdullah Talha, Dogru Ibrahim Alper, Cetin Aydin, APK Auditor: Permission-based Android malware detection system Digital Investigation. ,vol. 13, pp. 1- 14 ,(2015) , 10.1016/J.DIIN.2015.01.001
Yu Lu, Pan Zulie, Liu Jingju, Shen Yi, Android Malware Detection Technology Based on Improved Bayesian Classification international conference on instrumentation and measurement, computer, communication and control. pp. 1338- 1341 ,(2013) , 10.1109/IMCCC.2013.297