Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,172 papers from all fields of science
Search
Sign In
Create Free Account
Malware
Known as:
Stealthware
, Malicious exploit
, Badware
Expand
Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
App Store Approval Process
Application security
Arbitrary code execution
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
DroidDetector: Android Malware Characterization and Detection Using Deep Learning
Zhenlong Yuan
,
Yongqiang Lu
,
Y. Xue
2016
Corpus ID: 2605091
Smartphones and mobile tablets are rapidly becoming indispensable in daily life. Android has been the most popular mobile…
Expand
Highly Cited
2013
Highly Cited
2013
Permission-Based Android Malware Detection
Zarni Aung
,
W. Zaw
2013
Corpus ID: 1754769
Mobile devices have become popular in our lives since they offer almost the same functionality as personal computers. Among them…
Expand
Highly Cited
2013
Highly Cited
2013
Structural detection of android malware using embedded call graphs
Hugo Gascon
,
Fabian Yamaguchi
,
Dan Arp
,
Konrad Rieck
Security and Artificial Intelligence
2013
Corpus ID: 16039663
The number of malicious applications targeting the Android system has literally exploded in recent years. While the security…
Expand
Highly Cited
2012
Highly Cited
2012
“Andromaly”: a behavioral malware detection framework for android devices
A. Shabtai
,
Uri Kanonov
,
Y. Elovici
,
Chanan Glezer
,
Yael Weiss
Journal of Intelligence and Information Systems
2012
Corpus ID: 6993130
This article presents Andromaly—a framework for detecting malware on Android mobile devices. The proposed framework realizes a…
Expand
Highly Cited
2010
Highly Cited
2010
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces
R. Perdisci
,
Wenke Lee
,
N. Feamster
Symposium on Networked Systems Design and…
2010
Corpus ID: 5555881
We present a novel network-level behavioral malware clustering system. We focus on analyzing the structural similarities among…
Expand
Highly Cited
2009
Highly Cited
2009
Static Analysis of Executables for Collaborative Malware Detection on Android
Aubrey-Derrick Schmidt
,
Rainer Bye
,
+5 authors
S. Albayrak
IEEE International Conference on Communications
2009
Corpus ID: 2359422
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to…
Expand
Highly Cited
2008
Highly Cited
2008
Automatically Identifying Trigger-based Behavior in Malware
David Brumley
,
Cody Hartwig
,
Zhenkai Liang
,
J. Newsome
,
D. Song
,
Heng Yin
Botnet Detection
2008
Corpus ID: 32727190
Malware often contains hidden behavior which is only activated when properly triggered. Well known examples include: the MyDoom…
Expand
Highly Cited
2007
Highly Cited
2007
Opcodes as predictor for malware
D. Bilar
International Journal of Electronic Security and…
2007
Corpus ID: 15341737
This paper discusses a detection mechanism for malicious code through statistical analysis of opcode distributions. A total of 67…
Expand
Highly Cited
2007
Highly Cited
2007
IMDS: intelligent malware detection system
Yanfang Ye
,
Dingding Wang
,
Tao Li
,
Dongyi Ye
Knowledge Discovery and Data Mining
2007
Corpus ID: 8142630
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based anti…
Expand
Highly Cited
2007
Highly Cited
2007
MetaAware: Identifying Metamorphic Malware
Qinghua Zhang
,
D. Reeves
Asia-Pacific Computer Systems Architecture…
2007
Corpus ID: 6904925
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE