Skip to main navigation Skip to search Skip to main content

Android malware detection method based on function call graphs

  • Yuxin Ding*
  • , Siyi Zhu
  • , Xiaoling Xia
  • *Corresponding author for this work
  • Harbin Institute of Technology Shenzhen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the rapid development of mobile Internet, mobile devices have been widely used in people’s daily life, which has made mobile platforms a prime target for malware attack. In this paper we study on Android malware detection method. We propose the method how to extract the structural features of android application from its function call graph, and then use the structure features to build classifier to classify malware. The experiment results show that structural features can effectively improve the performance of malware detection methods.

Original languageEnglish
Title of host publicationNeural Information Processing - 23rd International Conference, ICONIP 2016, Proceedings
EditorsKazushi Ikeda, Minho Lee, Akira Hirose, Seiichi Ozawa, Kenji Doya, Derong Liu
PublisherSpringer Verlag
Pages70-77
Number of pages8
ISBN (Print)9783319466804
DOIs
StatePublished - 2016
Externally publishedYes
Event23rd International Conference on Neural Information Processing, ICONIP 2016 - Kyoto, Japan
Duration: 16 Oct 201621 Oct 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9950 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd International Conference on Neural Information Processing, ICONIP 2016
Country/TerritoryJapan
CityKyoto
Period16/10/1621/10/16

Keywords

  • Android malware
  • Machine learning
  • Static detection

Fingerprint

Dive into the research topics of 'Android malware detection method based on function call graphs'. Together they form a unique fingerprint.

Cite this