A review on feature selection in mobile malware detection

作者: Ali Feizollah , Nor Badrul Anuar , Rosli Salleh , Ainuddin Wahid Abdul Wahab

DOI: 10.1016/J.DIIN.2015.02.001

关键词:

摘要: … of features in mobile malware detection including the static, … the evaluation measures of malware detection in this section. … using Java code is more complex in malware detection than …

参考文章(124)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Michael Backes, Sebastian Gerling, Christian Hammer, Matteo Maffei, Philipp von Styp-Rekowsky, AppGuard: enforcing user requirements on android apps tools and algorithms for construction and analysis of systems. pp. 543- 548 ,(2013) , 10.1007/978-3-642-36742-7_39
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, PUMA: Permission Usage to Detect Malware in Android CISIS/ICEUTE/SOCO Special Sessions. pp. 289- 298 ,(2013) , 10.1007/978-3-642-33018-6_30
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas, Anomaly Detection using String Analysis for Android Malware Detection soco-cisis-iceute. pp. 469- 478 ,(2014) , 10.1007/978-3-319-01854-6_48
Min Zhao, Fangbin Ge, Tao Zhang, Zhijian Yuan, AntiMalDroid: An Efficient SVM-Based Malware Detection Framework for Android international conference on information computing and applications. pp. 158- 166 ,(2011) , 10.1007/978-3-642-27503-6_22
Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala, Quantitative Security Risk Assessment of Android Permissions and Applications Lecture Notes in Computer Science. pp. 226- 241 ,(2013) , 10.1007/978-3-642-39256-6_15
Veelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Batten, Contrasting Permission Patterns between Clean and Malicious Android Applications Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 69- 85 ,(2013) , 10.1007/978-3-319-04283-1_5
Johannes Hoffmann, Stephan Neumann, Thorsten Holz, Mobile Malware Detection Based on Energy Fingerprints -- A Dead End? recent advances in intrusion detection. pp. 348- 368 ,(2013) , 10.1007/978-3-642-41284-4_18
Jonathan Crussell, Clint Gibler, Hao Chen, Attack of the Clones: Detecting Cloned Applications on Android Markets Computer Security – ESORICS 2012. pp. 37- 54 ,(2012) , 10.1007/978-3-642-33167-1_3