4.6 Review

Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation)

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

EC2: Ensemble Clustering and Classification for Predicting Android Malware Families

Tanmoy Chakraborty et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Review Computer Science, Hardware & Architecture

The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

Daniel Gibert et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Review Computer Science, Information Systems

Android Malware Family Classification and Analysis: Current Status and Future Directions

Fahad Alswaina et al.

ELECTRONICS (2020)

Review Computer Science, Information Systems

A Systematic Literature Review of Android Malware Detection Using Static Analysis

Ya Pan et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Fingerprinting Android malware families

Nannan Xie et al.

FRONTIERS OF COMPUTER SCIENCE (2019)

Article Mathematics, Applied

Gaining deep knowledge of Android malware families through dimensionality reduction techniques

Rafael Vega Vega et al.

LOGIC JOURNAL OF THE IGPL (2019)

Article Computer Science, Theory & Methods

Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges

Ibrar Yaqoob et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Artificial Intelligence

Permission-based Android Malware Detection System Using Feature Selection with Genetic Algorithm

Oktay Yildiz et al.

INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING (2019)

Article Computer Science, Software Engineering

DELDROID: An automated approach for determination and enforcement of least-privilege architecture in android

Mahmoud Hammad et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2019)

Article Engineering, Multidisciplinary

Less Give More: Evaluate and zoning Android applications

Mohd Faizal Ab Razak et al.

MEASUREMENT (2019)

Article Computer Science, Artificial Intelligence

Application of deep learning to cybersecurity: A survey

Samaneh Mandavifar et al.

NEUROCOMPUTING (2019)

Article Computer Science, Information Systems

CENDroid-A cluster-ensemble classifier for detecting malicious Android applications

Shikha Badhani et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Information Systems

Ransomware Detection System for Android Applications

Samah Alsoghyer et al.

ELECTRONICS (2019)

Article Computer Science, Information Systems

A hybrid deep learning image-based analysis for effective malware detection

Sitalakshmi Venkatraman et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2019)

Article Computer Science, Information Systems

A scalable and extensible framework for android malware detection and family attribution

Li Zhang et al.

COMPUTERS & SECURITY (2019)

Proceedings Paper Computer Science, Theory & Methods

A survey of Static Android Malware Detection Techniques

Aiman Ahmad Abu Samra et al.

2019 IEEE 7TH PALESTINIAN INTERNATIONAL CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (PICECE) (2019)

Proceedings Paper Computer Science, Software Engineering

FastDroid: Efficient Taint Analysis for Android Applications

Jie Zhang et al.

2019 IEEE/ACM 41ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2019) (2019)

Proceedings Paper Engineering, Electrical & Electronic

AndMFC: Android Malware Family Classification Framework

Sercan Turker et al.

2019 IEEE 30TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC WORKSHOPS) (2019)

Article Computer Science, Information Systems

Experimental analysis of Android malware detection based on combinations of permissions and API-calls

Abhishek Kumar Singh et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2019)

Proceedings Paper Computer Science, Theory & Methods

Practical Precise Taint-flow Static Analysis for Android App Sets

William Klieber et al.

13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018) (2019)

Proceedings Paper Engineering, Electrical & Electronic

Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android

Diyu Wu et al.

2019 IEEE 12TH CONFERENCE ON SOFTWARE TESTING, VALIDATION AND VERIFICATION (ICST 2019) (2019)

Article Computer Science, Information Systems

Identifying Malicious Software Using Deep Residual Long-Short Term Memory

Aziz Alotaibi

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A3CM: Automatic Capability Annotation for Android Malware

Junyang Qiu et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Risk assessment of mobile applications based on machine learned malware dataset

Hyunki Kim et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics

Ahmad Firdaus et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Software Engineering

Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware

Joshua Garcia et al.

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2018)

Article Automation & Control Systems

CANDYMAN: Classifying Android malware families by modelling dynamic traces with Markov chains

Alejandro Martin et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2018)

Article Computer Science, Artificial Intelligence

Picking on the family: Disrupting android malware triage by forcing misclassification

Alejandro Calleja et al.

EXPERT SYSTEMS WITH APPLICATIONS (2018)

Article Computer Science, Theory & Methods

FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions

Ajit Kumar et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis

Ming Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Health Care Sciences & Services

Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management

Ahmad Firdaus et al.

JOURNAL OF MEDICAL SYSTEMS (2018)

Article Computer Science, Artificial Intelligence

Distance metric optimization driven convolutional neural network for age invariant face recognition

Ya Li et al.

PATTERN RECOGNITION (2018)

Review Environmental Sciences

A systematic review on Asian's farmers' adaptation practices towards climate change

Hayrol Azril Mohamed Shaffril et al.

SCIENCE OF THE TOTAL ENVIRONMENT (2018)

Article Computer Science, Information Systems

Consortium Blockchain-Based Malware Detection in Mobile Devices

Jingjing Gu et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System

Saba Arshad et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Discovering optimal features using static analysis and a genetic search based method for Android malware detection

Ahmad Firdaus et al.

FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING (2018)

Article Computer Science, Information Systems

Countering Android Malware: A Scalable Semi-Supervised Approach for Family-Signature Generation

Andrea Atzeni et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

Android Malware Permission-Based Multi-Class Classification Using Extremely Randomized Trees

Fahad Alswaina et al.

IEEE ACCESS (2018)

Article Multidisciplinary Sciences

Bio-inspired for Features Optimization and Malware Detection

Mohd Faizal Ab Razak et al.

ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING (2018)

Article Mathematics, Applied

Key features for the characterization of Android malware families

Javier Sedano et al.

LOGIC JOURNAL OF THE IGPL (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Shikra: A behavior-based Android malware detection framework

Ma Zhao-hui et al.

2017 INTERNATIONAL CONFERENCE ON GREEN INFORMATICS (ICGI) (2017)

Proceedings Paper Computer Science, Information Systems

Analysis of Android malware family characteristic based on isomorphism of sensitive API call graph

Hao Zhou et al.

2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC) (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Characterization of Android Malware Families by a Reduced Set of Static Features

Javier Sedano et al.

INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16 (2017)

Proceedings Paper Computer Science, Artificial Intelligence

Neural Visualization of Android Malware Families

Alejandro Gonzalez et al.

INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16 (2017)

Article Computer Science, Information Systems

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection

Ali Feizollah et al.

COMPUTERS & SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Automated Synthesis of Semantic Malware Signatures using Maximum Satisfiability

Yu Feng et al.

24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)

Article Computer Science, Information Systems

Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models

Mohsin Junaid et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Information Systems

Effective detection of android malware based on the usage of data flow APIs and machine learning

Songyang Wu et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2016)

Article Computer Science, Artificial Intelligence

ALDROID: efficient update of Android anti-virus software using designated active learning methods

Nir Nissim et al.

KNOWLEDGE AND INFORMATION SYSTEMS (2016)

Article Computer Science, Artificial Intelligence

Evaluation of machine learning classifiers for mobile malware detection

Fairuz Amalina Narudin et al.

SOFT COMPUTING (2016)

Proceedings Paper Computer Science, Hardware & Architecture

Dynamic Per-Warp Reconvergence Stack for Efficient Control Flow Handling in GPUs

Yaohua Wang et al.

2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI) (2016)

Proceedings Paper Computer Science, Information Systems

AndroZoo: Collecting Millions of Android Apps for the Research Community

Kevin Allix et al.

13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016) (2016)

Proceedings Paper Engineering, Electrical & Electronic

Behavior Grouping of Android Malware Family

Shun-Wen Hsiao et al.

2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) (2016)

Article Computer Science, Theory & Methods

Securing Android: A Survey, Taxonomy, and Challenges

Sufatrio et al.

ACM COMPUTING SURVEYS (2015)

Article Computer Science, Information Systems

Profiling user-trigger dependence for Android malware detection

Karim O. Elish et al.

COMPUTERS & SECURITY (2015)

Article Computer Science, Information Systems

Screening smartphone applications using malware family signatures

Jehyun Lee et al.

COMPUTERS & SECURITY (2015)

Review Computer Science, Information Systems

A review on feature selection in mobile malware detection

Ali Feizollah et al.

DIGITAL INVESTIGATION (2015)

Article Computer Science, Information Systems

APK Auditor: Permission-based Android malware detection system

Abdullah Talha Kabakus et al.

DIGITAL INVESTIGATION (2015)

Article Computer Science, Information Systems

High accuracy android malware detection using ensemble learning

Suleiman Y. Yerima et al.

IET INFORMATION SECURITY (2015)

Article Multidisciplinary Sciences

Human-level control through deep reinforcement learning

Volodymyr Mnih et al.

NATURE (2015)

Article Computer Science, Artificial Intelligence

Android based malware detection using a multifeature collaborative decision fusion approach

Shina Sheen et al.

NEUROCOMPUTING (2015)

Article Computer Science, Information Systems

Detecting and Classifying Android Malware Using Static Analysis along with Creator Information

Hyunjae Kang et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Article Computer Science, Information Systems

Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques

Michael Spreitzenbarth et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Article Computer Science, Information Systems

Permission based Android security: Issues and countermeasures

Zheran Fang et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Artificial Intelligence

Novel active learning methods for enhanced PC malware detection in windows OS

Nir Nissim et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Artificial Intelligence

DENDROID: A text mining approach to analyzing and classifying code structures in Android malware families

Guillermo Suarez-Tangil et al.

EXPERT SYSTEMS WITH APPLICATIONS (2014)

Article Computer Science, Information Systems

Analysis of Bayesian classification-based approaches for Android malware detection

Suleiman Y. Yerima et al.

IET INFORMATION SECURITY (2014)

Article Computer Science, Hardware & Architecture

Detecting mobile malware threats to homeland security through static analysis

Seung-Hyun Seo et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2014)

Article Computer Science, Cybernetics

MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID

Borja Sanz et al.

CYBERNETICS AND SYSTEMS (2013)

Proceedings Paper Computer Science, Information Systems

Investigation of Static and Dynamic Android Anti-Virus Strategies

Yan Ma et al.

PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (2013)

Proceedings Paper Telecommunications

Analysis of Clustering Technique in Android Malware Detection

Aiman A. Abu Samra et al.

2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013) (2013)

Proceedings Paper Computer Science, Hardware & Architecture

A New Android Malware Detection Approach Using Bayesian Classification

Suleiman Y. Yerima et al.

2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) (2013)

Proceedings Paper Computer Science, Software Engineering

LeakMiner: Detect information leakage on Android with static taint analysis

ZheMin Yang et al.

PROCEEDINGS OF THE 2012 THIRD WORLD CONGRESS ON SOFTWARE ENGINEERING (WCSE 2012) (2012)

Article Computer Science, Information Systems

Reducing the window of opportunity for Android malware Gotta catch 'em all

Axelle Apvrille et al.

JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES (2012)

Article Computer Science, Information Systems

Forensic carving of network packets and associated data structures

Robert Beverly et al.

DIGITAL INVESTIGATION (2011)

Review Biochemical Research Methods

A Review of Ensemble Methods in Bioinformatics

Pengyi Yang et al.

CURRENT BIOINFORMATICS (2010)

Article Computer Science, Software Engineering

The design and implementation of an application program interface for securing XML documents

Tao-Ku Chang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2007)

Review Computer Science, Artificial Intelligence

Machine learning: a review of classification and combining techniques

S. B. Kotsiantis et al.

ARTIFICIAL INTELLIGENCE REVIEW (2006)