Shikra: A Behavior-Based Android Malware Detection Framework
With the growth of Android platform malicious application, the seperation of malicious application from nonmalicious application has become challenging. In recent years, a combination of static analysis and dynamic analysis of the idea is very popular. However, it is very costly for dynamic analysis...
Saved in:
Published in | 2017 International Conference on Green Informatics (ICGI) pp. 175 - 184 |
---|---|
Main Authors | , , , , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | With the growth of Android platform malicious application, the seperation of malicious application from nonmalicious application has become challenging. In recent years, a combination of static analysis and dynamic analysis of the idea is very popular. However, it is very costly for dynamic analysis to achieve high coverage. In this article we present an efficient, lightweight and behavior-based architecture based on the behavior of malicious developers. Information and behavior preferences of malicious developers in binary code are collected. And through the multi-plane SVM Android application malicious and non-malicious division. |
---|---|
DOI: | 10.1109/ICGI.2017.35 |