Open Access iconOpen Access

ARTICLE

A Graph-Based Interpretable Framework for Effective Android Malware Detection#

Chun-I Fan1,2, Sheng-Feng Lu1, Cheng-Han Shie1, Ming-Feng Tsai1, Tomohiro Morikawa3,*, Takeshi Takahashi4, Tao Ban4

1 Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan
2 Information Security Research Center, National Sun Yat-sen University, Kaohsiung, Taiwan
3 Graduate School of Information Science, University of Hyogo, Kobe, Japan
4 Cybersecurity Research Institute, National Institute of Information and Communications Technology, Tokyo, Japan

* Corresponding Author: Tomohiro Morikawa. Email: email

(This article belongs to the Special Issue: Advanced Security and Privacy for Future Mobile Internet and Convergence Applications: A Computer Modeling Approach)

Computer Modeling in Engineering & Sciences 2026, 147(1), 47 https://doi.org/10.32604/cmes.2026.077799

Abstract

Due to its partly open-source architecture, which allows for application analysis and repackaging, along with its large market share, the Android operating system is a main target for malware. In recent years, researchers have widely adopted neural network-based methods for detecting Android malware, achieving impressive results but without interpretability. Interpretability is crucial for showing how models behave and identifying biases in their predictions, which helps in validating and improving them. Additionally, in urgent malware analysis situations, interpretability lets analysts quickly assess harmful behaviors and aids in future malware development and investigation. Therefore, interpretability is vital for ensuring that neural network-based malware detection models are trustworthy, predictable, and strong. To address these issues, we propose an interpretable Graph Attention Network (GAT)-based framework for Android malware detection. This framework includes data flow analysis of Android applications to identify malicious behaviors, providing clarity through the attention mechanism of GAT. Analysts and researchers can access detailed information, such as the names and execution order of the involved Android APIs, allowing for better validation and security checks. Experimental results show that our framework achieves a precision of 97.4%. Additionally, case studies highlight the insights that researchers can gain by using this framework.

Keywords

Android malware detection; graph neural network; explainable artificial intelligence

Cite This Article

APA Style
Fan, C., Lu, S., Shie, C., Tsai, M., Morikawa, T. et al. (2026). A Graph-Based Interpretable Framework for Effective Android Malware Detection#. Computer Modeling in Engineering & Sciences, 147(1), 47. https://doi.org/10.32604/cmes.2026.077799
Vancouver Style
Fan C, Lu S, Shie C, Tsai M, Morikawa T, Takahashi T, et al. A Graph-Based Interpretable Framework for Effective Android Malware Detection#. Comput Model Eng Sci. 2026;147(1):47. https://doi.org/10.32604/cmes.2026.077799
IEEE Style
C. Fan et al., “A Graph-Based Interpretable Framework for Effective Android Malware Detection#,” Comput. Model. Eng. Sci., vol. 147, no. 1, pp. 47, 2026. https://doi.org/10.32604/cmes.2026.077799



cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 217

    View

  • 58

    Download

  • 0

    Like

Share Link