Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs

@inproceedings{Zhang2014SemanticsAwareAM,
  title={Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs},
  author={Mu Zhang and Yue Duan and Heng Yin and Zhiruo Zhao},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2014}
}
The drastic increase of Android malware has led to a strong interest in developing methods to automate the malware analysis process. Existing automated Android malware detection and classification methods fall into two general categories: 1) signature-based and 2) machine learning-based. Signature-based approaches can be easily evaded by bytecode-level transformation attacks. Prior learning-based works extract features from application syntax, rather than program semantics, and are also subject… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 181 CITATIONS

Behavior Intention Derivation of Android Malware Using Ontology Inference

  • J. Electrical and Computer Engineering
  • 2018
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks

  • 2018 IEEE European Symposium on Security and Privacy (EuroS&P)
  • 2018
VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Formal Methods and Software Engineering

  • Lecture Notes in Computer Science
  • 2018
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

[Journal First] Lightweight, Obfuscation-Resilient Detection and Family Identification of Android Malware

  • 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE)
  • 2018
VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Hunting ELFs : An investigation into Android malware detection

VIEW 6 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

DroidNative: Semantic-Based Detection of Android Native Code Malware

VIEW 18 EXCERPTS
CITES METHODS, RESULTS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2014
2019

CITATION STATISTICS

  • 34 Highly Influenced Citations

  • Averaged 38 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES

Dissecting Android Malware: Characterization and Evolution

  • 2012 IEEE Symposium on Security and Privacy
  • 2012
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Android and Security

H. Lockheimer
  • http://googlemobile.blogspot.com/2012/ 02/android-and-security.html,
  • 2012
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

CHEX: statically vetting Android apps for component hijacking vulnerabilities

  • ACM Conference on Computer and Communications Security
  • 2012
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL

PScout: analyzing the Android permission specification

  • ACM Conference on Computer and Communications Security
  • 2012
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL