4.7 Article

AndroMalPack: enhancing the ML-based malware classification by detection and removal of repacked apps for Android systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system

Akshat Gaurav et al.

Summary: The Internet of Things has gained attention from academics and business information systems. It connects smart devices in an organizational information system and allows them to exchange data. However, the usage of Android apps in IoT devices makes them vulnerable to malware attacks. Researchers have proposed various attack mitigation approaches, and machine learning is considered the most promising strategy due to its accuracy and adaptability.

ENTERPRISE INFORMATION SYSTEMS (2023)

Article Engineering, Multidisciplinary

A Malicious Mining Code Detection Method Based on Multi-Features Fusion

Shudong Li et al.

Summary: This paper introduces a malicious mining code detection method based on feature fusion and machine learning. It extracts multi-dimensional features and fuses them with other statistical features to train a detection model using machine learning. Experimental results show that the method has high recognition accuracy and performance metrics.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Information Systems

Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense

Amit Sharma et al.

Summary: Modern cyber attacks are highly targeted and employ advanced tactics and techniques. These attacks, known as Advanced Persistent Threats (APTs), aim to evade detection and sabotage or engage in espionage on the victim's digital infrastructure. APT attacks are capable of targeting multiple operating environments and utilize sophisticated malware. Research indicates that the evasive tactics employed in these attacks outweigh the security measures of current solutions.

COMPUTERS & SECURITY (2022)

Proceedings Paper Computer Science, Information Systems

An Investigation on Fragility of Machine Learning Classifiers in Android Malware Detection

Husnain Rafiq et al.

Summary: Machine learning classifiers have been widely used in Android malware detection and countermeasures, but they are vulnerable to adversarial evasion attacks. This paper highlights the fragility of ML classifiers against such attacks and proposes an adversarial training scheme to improve evasion detection.

IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS) (2022)

Article Computer Science, Artificial Intelligence

TriDroid: a triage and classification framework for fast detection of mobile threats in android markets

Abdelouahab Amira et al.

Summary: In order to maintain a healthy Android ecosystem, a market-scale triage and classification system called TriDroid has been proposed. TriDroid prioritizes apps analysis according to their likelihood of risk, categorizing them into botnet, general malware, and benign categories. It applies a fast triage process followed by a more accurate classification process to quickly detect and prioritize the analysis of malicious applications, showing a trade-off between waiting time and processing overhead.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2021)

Article Computer Science, Information Systems

An efficient approach for taint analysis of android applications

Jie Zhang et al.

Summary: This paper introduces an efficient and precise approach for taint analysis in Android apps called FastDroid, which outperforms the state-of-the-art tool FlowDroid in terms of performance and efficiency according to the evaluation results.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning

Hemant Rathore et al.

Summary: The study proposed two novel attack strategies against Android malware detection systems, ultimately achieving the goal of increasing the fooling rate by making minimum modifications to the detection models. The research demonstrates that the proposed Android malware detection system using reinforcement learning is more robust against adversarial attacks.

INFORMATION SYSTEMS FRONTIERS (2021)

Article Computer Science, Information Systems

Android malware detection via an app similarity graph

Tatiana Frenklach et al.

Summary: In order to effectively address the increasing number of Android applications and advancements in software development, a static Android application analysis method based on an app similarity graph (ASG) is proposed. The method achieves high accuracy and AUC values on different datasets in both balanced and unbalanced settings.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

ProDroid - An Android malware detection framework based on profile hidden Markov model

Satheesh Kumar Sasidharan et al.

Summary: This paper introduces a new behavioral method for Android malware detection and classification, which decompiles the Android malware dataset to identify suspicious API classes/methods and generates an encoded list. It creates multiple sequence alignment for different malware families using the encoded patterns and applies it to generate profile hidden Markov model. The model classifies unknown applications as benign or malicious based on the log likelihood score, achieving an accuracy of 94.5%.

PERVASIVE AND MOBILE COMPUTING (2021)

Article Computer Science, Interdisciplinary Applications

Malicious mining code detection based on ensemble learning in cloud computing environment

Shudong Li et al.

Summary: The study proposes a method for detecting malicious mining code in cloud platforms by fusing Bagging and Boosting algorithms to construct a detection model, reducing the variance of model detection significantly and achieving higher accuracy and robustness compared to traditional classifiers. The experimental results show high values of AUC (0.992) and F1-score (0.987), with a low standard deviation of AUC values under different data inputs (0.0009).

SIMULATION MODELLING PRACTICE AND THEORY (2021)

Review Computer Science, Information Systems

A survey of malware detection in Android apps: Recommendations and perspectives for future research

Asma Razgallah et al.

Summary: This paper investigates the main mechanisms and approaches for malware detection in Android applications, identifying the advantages and limitations of each, and suggesting avenues for future research in this area.

COMPUTER SCIENCE REVIEW (2021)

Article Computer Science, Information Systems

You Shall not Repackage! Demystifying Anti-Repackaging on Android

Alessio Merlo et al.

Summary: This paper investigates the impact of app repackaging on mobile app security and analyzes the current issues with anti-repackaging approaches. It focuses on the weaknesses of existing anti-repackaging schemes, summarizes the main attack vectors, and demonstrates how these attack vectors allow circumventing the current proposals.

COMPUTERS & SECURITY (2021)

Proceedings Paper Computer Science, Information Systems

Multi-View Learning for Repackaged Malware Detection

Shirish Singh et al.

Summary: The act of repackaging malware poses a significant threat to the Android ecosystem, as it shares a high percentage of features with benign apps, making detection challenging. This paper introduces a novel technique based on multi-view learning to address this challenge, achieving an accuracy of 97.46% and an F1 score of 0.98 in analyzing 15,297 pairs of repackaged apps.

ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (2021)

Article Computer Science, Information Systems

DroidClone: Attack of the Android Malware Clones - A Step Towards Stopping Them

Shahid Alam et al.

Summary: Code clones are commonly used due to their easy and cost-effective creation, especially for malware writers. The need to develop techniques and tools to prevent attacks from Android malware clones is essential. DroidClone is a proposed solution that exposes code clones in Android applications to detect malware effectively.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

Mining nested flow of dominant APIs for detecting android malware

Shahid Alam et al.

COMPUTER NETWORKS (2020)

Review Computer Science, Hardware & Architecture

The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

Daniel Gibert et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2020)

Article Computer Science, Information Systems

Can machine learning model with static features be fooled: an adversarial machine learning approach

Rahim Taheri et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)

Article Computer Science, Artificial Intelligence

GSDroid: Graph Signal Based Compact Feature Representation for Android Malware Detection

Roopak Surendran et al.

EXPERT SYSTEMS WITH APPLICATIONS (2020)

Article Computer Science, Theory & Methods

Intelligent mobile malware detection using permission requests and API calls

Moutaz Alazab et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

cHybriDroid: A Machine Learning-Based Hybrid Technique for Securing the Edge Computing

Afifa Maryam et al.

SECURITY AND COMMUNICATION NETWORKS (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation Algorithms

Jack Pye et al.

2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)

Proceedings Paper Computer Science, Software Engineering

Unsuccessful Story about Few Shot Malware Family Classification and Siamese Network to the Rescue

Yude Bai et al.

2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020) (2020)

Proceedings Paper Computer Science, Information Systems

IPDroid: Android Malware Detection using Intents and Permissions

Kartik Khariwal et al.

PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020) (2020)

Article Computer Science, Information Systems

FAMD: A Fast Multifeature Android Malware Detection Framework, Design, and Implementation

Hongpeng Bai et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling

Haipeng Cai et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2019)

Article Computer Science, Information Systems

An Efficient Android Malware Detection System Based on Method-Level Behavioral Semantic Analysis

Hanqing Zhang et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Artificial Intelligence

Permission-based Analysis of Android Applications Using Categorization and Deep Learning Scheme

Hamidreza Alimardani et al.

ENGINEERING APPLICATION OF ARTIFICIAL INTELLIGENCE CONFERENCE 2018 (EAAIC 2018) (2019)

Article Computer Science, Information Systems

DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications

Yubin Yang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2018)

Article Computer Science, Software Engineering

Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware

Joshua Garcia et al.

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY (2018)

Article Computer Science, Theory & Methods

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis

Ming Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Artificial Intelligence

DroidDet: Effective and robust detection of android malware using static analysis along with rotation forest model

Hui-Juan Zhu et al.

NEUROCOMPUTING (2018)

Article Computer Science, Information Systems

A Comparison of Android Reverse Engineering Tools via Program Behaviors Validation Based on Intermediate Languages Transformation

Yauhen Leanidavich Arnatovi et al.

IEEE ACCESS (2018)

Review Computer Science, Information Systems

Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems

Luiz C. Navarro et al.

COMPUTERS & SECURITY (2018)

Proceedings Paper Computer Science, Artificial Intelligence

Evaluation of Tree Based Machine Learning Classifiers for Android Malware Detection

Md. Shohel Rana et al.

COMPUTATIONAL COLLECTIVE INTELLIGENCE, ICCCI 2018, PT II (2018)

Article Computer Science, Information Systems

The duplication issue within the Drebin dataset

Paul Irolla et al.

JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES (2018)

Article Computer Science, Information Systems

APPraiser: A Large Scale Analysis of Android Clone Apps

Yuta IshiI et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)

Article Computer Science, Information Systems

APPraiser: A Large Scale Analysis of Android Clone Apps

Yuta IshiI et al.

IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS (2017)

Proceedings Paper Computer Science, Software Engineering

CodeMatch: Obfuscation Won't Conceal Your Repackaged App

Leonid Glanz et al.

ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING (2017)

Article Computer Science, Theory & Methods

A Survey on Malware Detection Using Data Mining Techniques

Yanfang Ye et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Hardware & Architecture

Machine learning aided Android malware classification

Nikola Milosevic et al.

COMPUTERS & ELECTRICAL ENGINEERING (2017)

Article Computer Science, Information Systems

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection

Ali Feizollah et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Theory & Methods

The Evolution of Android Malware and Android Analysis Techniques

Kimberly Tam et al.

ACM COMPUTING SURVEYS (2017)

Proceedings Paper Computer Science, Information Systems

AndroZoo: Collecting Millions of Android Apps for the Research Community

Kevin Allix et al.

13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016) (2016)

Article Computer Science, Information Systems

Power Consumption Based Android Malware Detection

Hongyu Yang et al.

JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING (2016)

Proceedings Paper Computer Science, Information Systems

A Rapid and Scalable Method for Android Application Repackaging Detection

Sibei Jiao et al.

INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015 (2015)

Article Computer Science, Interdisciplinary Applications

Grey Wolf Optimizer

Seyedali Mirjalili et al.

ADVANCES IN ENGINEERING SOFTWARE (2014)

Article Computer Science, Theory & Methods

Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks

Vaibhav Rastogi et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2014)

Article Computer Science, Information Systems

Identifying almost identical files using context triggered piecewise hashing

Jesse Kornblum

DIGITAL INVESTIGATION (2006)