A Comparison of Features for Android Malware Detection

作者: Matthew Leeds , Miclain Keffeler , Travis Atkison

DOI: 10.1145/3077286.3077288

关键词:

摘要: With the increase in mobile device use, there is a greater need for increasingly sophisticated malware detection algorithms. The research presented in this paper examines two types of …

参考文章(21)
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming Lee, Kuo-Ping Wu, DroidMat: Android Malware Detection through Manifest and API Calls Tracing information security. pp. 62- 69 ,(2012) , 10.1109/ASIAJCIS.2012.18
Lei Cen, Christoher S. Gates, Luo Si, Ninghui Li, A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code IEEE Transactions on Dependable and Secure Computing. ,vol. 12, pp. 400- 412 ,(2015) , 10.1109/TDSC.2014.2355839
Federico Maggi, Andrea Valdi, Stefano Zanero, AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors security and privacy in smartphones and mobile devices. pp. 49- 54 ,(2013) , 10.1145/2516760.2516768
Mohammed S. Alam, Son T. Vuong, Random Forest Classification for Detecting Android Malware 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing. pp. 663- 669 ,(2013) , 10.1109/GREENCOM-ITHINGS-CPSCOM.2013.122
Nigel Williams, Sebastian Zander, Grenville Armitage, A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification ACM SIGCOMM Computer Communication Review. ,vol. 36, pp. 5- 16 ,(2006) , 10.1145/1163593.1163596
Justin Sahs, Latifur Khan, A Machine Learning Approach to Android Malware Detection european intelligence and security informatics conference. pp. 141- 147 ,(2012) , 10.1109/EISIC.2012.34
Y. Bengio, P. Simard, P. Frasconi, Learning long-term dependencies with gradient descent is difficult IEEE Transactions on Neural Networks. ,vol. 5, pp. 157- 166 ,(1994) , 10.1109/72.279181
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
D.H. Wolpert, W.G. Macready, No free lunch theorems for optimization IEEE Transactions on Evolutionary Computation. ,vol. 1, pp. 67- 82 ,(1997) , 10.1109/4235.585893
Zarni Aung, Win Zaw, Permission-Based Android Malware Detection International Journal of Scientific & Technology Research. ,vol. 2, pp. 228- 234 ,(2013)