Vis enkel innførsel

dc.contributor.authorAlazab, Moutaz
dc.contributor.authorAlazab, Mamoun
dc.contributor.authorShalaginov, Andrii
dc.contributor.authorMesleh, Abdelwadood
dc.contributor.authorAwajan, Albara
dc.date.accessioned2021-03-05T10:50:57Z
dc.date.available2021-03-05T10:50:57Z
dc.date.created2020-10-21T14:53:47Z
dc.date.issued2020
dc.identifier.citationFuture generations computer systems. 2020, 107 509-521.en_US
dc.identifier.issn0167-739X
dc.identifier.urihttps://hdl.handle.net/11250/2731815
dc.description.abstractMalware is a serious threat that has been used to target mobile devices since its inception. Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected malicious apps. Defending against the cyber threats of mobile malware requires a strong understanding of the permissions declared in applications and application programmeinterface (API) calls. In this paper, we propose an effective classification model that combines permission requests and API calls. As Android apps use a large number of APIs, we propose three different grouping strategies for choosing the most valuable API calls to maximize the likelihood of identifying Android malware apps: the ambiguous group, risky group, and disruptive group. The results demonstrate that compared with benign apps, malicious applications invoke a different set of API calls and that mobile malware often requests dangerous permissions to access sensitive data more often than benign apps. Empirical results obtained with a real malware dataset containing 27,891 Android apps suggest that our proposed method is effective at detecting mobile malware apps and achieves an F-measure of 94.3%. Our model can significantly assist in the process of malware forensic investigation and mobile application analysis.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleIntelligent mobile malware detection using permission requests and API callsen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionacceptedVersionen_US
dc.source.pagenumber509-521en_US
dc.source.volume107en_US
dc.source.journalFuture generations computer systemsen_US
dc.identifier.doi10.1016/j.future.2020.02.002
dc.identifier.cristin1841258
dc.description.localcode"© 2020. This is the authors’ accepted and refereed manuscript to the article. Locked until 5.2.2022 due to copyright restrictions. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/ "en_US
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal