As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue, we set to detect malware from a behavioral point of view, modeled as the sequence of abstracted API calls. We introduce MAMADROID, a static-analysis-based system that abstracts app’s API calls to their class, package, or family, and builds a model from their sequences obtained from the call graph of an app as Markov chains. This ensures that the...
Android smartphones have become a vital component of the daily routine of millions of people, runnin...
Ransomware constitutes a significant threat to the Android operating system. It can either lock or e...
Abstract Most existing malicious Android app detection approaches rely on manually selected detectio...
As Android has become increasingly popular, so has malware targeting it, thus motivating the researc...
The rise in popularity of the Android platform has resulted in an explosion of malware threats targ...
Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted ...
Android offers plenty of services to mobile users and has gained significant popularity worldwide. T...
Today, Android is one of the most used operating systems in smartphone technology. This is the main ...
Android users are constantly threatened by an increasing number of malicious applications (apps), ge...
Mobile malware has recently become an acute problem. Existing solutions either base static reasoning...
Malware threats are growing, while at the same time, concealment strategies are being used to make t...
Anti-mobile malware has attracted the attention of the research and security community in recent ye...
open access articleThis paper investigates the impact of code coverage on machine learning-based dyn...
Google’s Android operating system was first announced to the public in 2007 and was installed on mor...
Machine learning classification algorithms are widely applied to different malware analysis problems...
Android smartphones have become a vital component of the daily routine of millions of people, runnin...
Ransomware constitutes a significant threat to the Android operating system. It can either lock or e...
Abstract Most existing malicious Android app detection approaches rely on manually selected detectio...
As Android has become increasingly popular, so has malware targeting it, thus motivating the researc...
The rise in popularity of the Android platform has resulted in an explosion of malware threats targ...
Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted ...
Android offers plenty of services to mobile users and has gained significant popularity worldwide. T...
Today, Android is one of the most used operating systems in smartphone technology. This is the main ...
Android users are constantly threatened by an increasing number of malicious applications (apps), ge...
Mobile malware has recently become an acute problem. Existing solutions either base static reasoning...
Malware threats are growing, while at the same time, concealment strategies are being used to make t...
Anti-mobile malware has attracted the attention of the research and security community in recent ye...
open access articleThis paper investigates the impact of code coverage on machine learning-based dyn...
Google’s Android operating system was first announced to the public in 2007 and was installed on mor...
Machine learning classification algorithms are widely applied to different malware analysis problems...
Android smartphones have become a vital component of the daily routine of millions of people, runnin...
Ransomware constitutes a significant threat to the Android operating system. It can either lock or e...
Abstract Most existing malicious Android app detection approaches rely on manually selected detectio...