Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Outsmarting Android Malware with Cutting-Edge Feature Engineering and Machine Learning Techniques

    Ahsan Wajahat1, Jingsha He1, Nafei Zhu1, Tariq Mahmood2,3, Tanzila Saba2, Amjad Rehman Khan2, Faten S. Alamri4,*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 651-673, 2024, DOI:10.32604/cmc.2024.047530

    Abstract The growing usage of Android smartphones has led to a significant rise in incidents of Android malware and privacy breaches. This escalating security concern necessitates the development of advanced technologies capable of automatically detecting and mitigating malicious activities in Android applications (apps). Such technologies are crucial for safeguarding user data and maintaining the integrity of mobile devices in an increasingly digital world. Current methods employed to detect sensitive data leaks in Android apps are hampered by two major limitations they require substantial computational resources and are prone to a high frequency of false positives. This means that while attempting to… More >

  • Open Access

    ARTICLE

    Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs

    Rahul Gupta1, Kapil Sharma1,*, R. K. Garg2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4283-4301, 2024, DOI:10.32604/cmc.2024.046890

    Abstract The prevalence of smartphones is deeply embedded in modern society, impacting various aspects of our lives. Their versatility and functionalities have fundamentally changed how we communicate, work, seek entertainment, and access information. Among the many smartphones available, those operating on the Android platform dominate, being the most widely used type. This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years. Therefore, there is an urgent need to develop new methods for detecting Android malware. The literature contains numerous works related to Android malware detection. As far as our understanding… More >

  • Open Access

    ARTICLE

    Android Malware Detection Using ResNet-50 Stacking

    Lojain Nahhas1, Marwan Albahar1,*, Abdullah Alammari2, Anca Jurcut3

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3997-4014, 2023, DOI:10.32604/cmc.2023.028316

    Abstract There has been an increase in attacks on mobile devices, such as smartphones and tablets, due to their growing popularity. Mobile malware is one of the most dangerous threats, causing both security breaches and financial losses. Mobile malware is likely to continue to evolve and proliferate to carry out a variety of cybercrimes on mobile devices. Mobile malware specifically targets Android operating system as it has grown in popularity. The rapid proliferation of Android malware apps poses a significant security risk to users, making static and manual analysis of malicious files difficult. Therefore, efficient identification and classification of Android malicious… More >

  • Open Access

    ARTICLE

    Swarm Optimization and Machine Learning for Android Malware Detection

    K. Santosh Jhansi1,2,*, P. Ravi Kiran Varma2, Sujata Chakravarty3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6327-6345, 2022, DOI:10.32604/cmc.2022.030878

    Abstract Malware Security Intelligence constitutes the analysis of applications and their associated metadata for possible security threats. Application Programming Interfaces (API) calls contain valuable information that can help with malware identification. The malware analysis with reduced feature space helps for the efficient identification of malware. The goal of this research is to find the most informative features of API calls to improve the android malware detection accuracy. Three swarm optimization methods, viz., Ant Lion Optimization (ALO), Cuckoo Search Optimization (CSO), and Firefly Optimization (FO) are applied to API calls using auto-encoders for identification of most influential features. The nature-inspired wrapper-based algorithms… More >

  • Open Access

    ARTICLE

    Android Malware Detection Based on Feature Selection and Weight Measurement

    Huizhong Sun1, Guosheng Xu1,*, Zhimin Wu2, Ruijie Quan3

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 585-600, 2022, DOI:10.32604/iasc.2022.023874

    Abstract With the rapid development of Android devices, Android is currently one of the most popular mobile operating systems. However, it is also believed to be an entry point of many attack vectors. The existing Android malware detection method does not fare well when dealing with complex and intelligent malware applications, especially those based on feature detection systems which have become increasingly elusive. Therefore, we propose a novel feature selection algorithm called frequency differential selection (FDS) and weight measurement for Android malware detection. The purpose is to solve the shortcomings of the existing feature selection algorithms in detection and to filter… More >

  • Open Access

    ARTICLE

    Using Capsule Networks for Android Malware Detection Through Orientation-Based Features

    Sohail Khan1,*, Mohammad Nauman2, Suleiman Ali Alsaif1, Toqeer Ali Syed3, Hassan Ahmad Eleraky1

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5345-5362, 2022, DOI:10.32604/cmc.2022.021271

    Abstract Mobile phones are an essential part of modern life. The two popular mobile phone platforms, Android and iPhone Operating System (iOS), have an immense impact on the lives of millions of people. Among these two, Android currently boasts more than 84% market share. Thus, any personal data put on it are at great risk if not properly protected. On the other hand, more than a million pieces of malware have been reported on Android in just 2021 till date. Detecting and mitigating all this malware is extremely difficult for any set of human experts. Due to this reason, machine learning–and… More >

  • Open Access

    ARTICLE

    Unified Detection of Obfuscated and Native Android Malware

    Pagnchakneat C. Ouk1, Wooguil Pak2,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3099-3116, 2022, DOI:10.32604/cmc.2022.020202

    Abstract The Android operating system has become a leading smartphone platform for mobile and other smart devices, which in turn has led to a diversity of malware applications. The amount of research on Android malware detection has increased significantly in recent years and many detection systems have been proposed. Despite these efforts, however, most systems can be thwarted by sophisticated Android malware adopting obfuscation or native code to avoid discovery by anti-virus tools. In this paper, we propose a new static analysis technique to address the problems of obfuscating and native malware applications. The proposed system provides a unified technique for… More >

  • Open Access

    ARTICLE

    Novel Android Malware Detection Method Based on Multi-dimensional Hybrid Features Extraction and Analysis

    Yue Li1, Guangquan Xu2,3, Hequn Xian1,*, Longlong Rao3, Jiangang Shi4,*

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 637-647, 2019, DOI:10.31209/2019.100000118

    Abstract In order to prevent the spread of Android malware and protect privacy information from being compromised, this study proposes a novel multidimensional hybrid features extraction and analysis method for Android malware detection. This method is based primarily on a multidimensional hybrid features vector by extracting the information of permission requests, API calls, and runtime behaviors. The innovation of this study is to extract greater amounts of static and dynamic features information and combine them, that renders the features vector for training completer and more comprehensive. In addition, the feature selection algorithm is used to further optimize the extracted information to… More >

Displaying 1-10 on page 1 of 8. Per Page