In resource constrained devices, malware detection is typically based on offline analysis using emulation. In previous work it has been claimed that such emulation fails for a significant percentage of Android malware because well-designed malware detects that the code is being emulated. An alternative to emulation is malware analysis based on code that is executing on an actual Android device. In this research, we collect features from a corpus of Android malware using both emulation and on-phone instrumentation. We train machine learning models based on emulated features and also train models based on features collected via instrumentation, and we compare the results obtained in these two cases
With the increasing use of mobile devices, malware attacks are rising, especially on Android phones,...
The large amounts of malware, and its diversity, have made it nec-essary for the security community ...
The prosperity of mobile devices have been rapidly and drastically reforming the use pattern and of ...
In resource constrained devices, malware detection is typically based on offline analysis using emul...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Due to the increased number of mobile devices, they are integrated in every dimension of our daily ...
As the Android operating system continues to thrive on the mobile platform, it also spawned a large ...
This paper describes the techniques used to detect Android malware using a machine learning approach...
Android malware has emerged as a consequence of the increasing popularity of smartphones and tablets...
Android is popular mobile operating system and there are multiple marketplaces for android applicati...
Smartphones’ popularity and use has been increasing exponentially over the years. This also opens up...
The open source nature of Android Operating System has attracted wider adoption of the system by mul...
Mobile Phones have become an important need of today. The term mobile phone and smart phone are almo...
© 2018 Association for Computing Machinery. Android is the most popular mobile operating system havi...
With the rapid growth of Android devices and applications, the Android environment faces more securi...
With the increasing use of mobile devices, malware attacks are rising, especially on Android phones,...
The large amounts of malware, and its diversity, have made it nec-essary for the security community ...
The prosperity of mobile devices have been rapidly and drastically reforming the use pattern and of ...
In resource constrained devices, malware detection is typically based on offline analysis using emul...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Due to the increased number of mobile devices, they are integrated in every dimension of our daily ...
As the Android operating system continues to thrive on the mobile platform, it also spawned a large ...
This paper describes the techniques used to detect Android malware using a machine learning approach...
Android malware has emerged as a consequence of the increasing popularity of smartphones and tablets...
Android is popular mobile operating system and there are multiple marketplaces for android applicati...
Smartphones’ popularity and use has been increasing exponentially over the years. This also opens up...
The open source nature of Android Operating System has attracted wider adoption of the system by mul...
Mobile Phones have become an important need of today. The term mobile phone and smart phone are almo...
© 2018 Association for Computing Machinery. Android is the most popular mobile operating system havi...
With the rapid growth of Android devices and applications, the Android environment faces more securi...
With the increasing use of mobile devices, malware attacks are rising, especially on Android phones,...
The large amounts of malware, and its diversity, have made it nec-essary for the security community ...
The prosperity of mobile devices have been rapidly and drastically reforming the use pattern and of ...