Poking the bear: Lessons learned from probing three android malware datasets

Aleieldin Salem, Alexander Pretschner

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

2 Zitate (Scopus)

Abstract

To counter the continuous threat posed by Android malware, we attempted to devise a novel method based on active learning. Nonetheless, evaluating our active learning based method on three different Android malware datasets resulted in performance discrepancies. In an attempt to explain such inconsistencies, we postulated research questions and designed corresponding experiments to answer them. The results of our experiments unveiled the reasons behind the struggles of our method and, more importantly, revealed some limitations with the current Android malware detection methods that, we fear, can be leveraged by malware authors to evade detection. In this paper, we share with the research community our research questions, experiments, and findings to instigate researchers to devise methods to tackle such limitations.

OriginalspracheEnglisch
TitelA-Mobile 2018 - Proceedings of the 1st International Workshop on Advances in Mobile App Analysis, co-located with ASE 2018
Redakteure/-innenJacques Klein, Guozhu Meng, Sam Malek, Li Li
Herausgeber (Verlag)Association for Computing Machinery, Inc
Seiten19-24
Seitenumfang6
ISBN (elektronisch)9781450359733
DOIs
PublikationsstatusVeröffentlicht - 4 Sept. 2018
Veranstaltung1st International Workshop on Advances in Mobile App Analysis, A-Mobile 2018, co-located with the 33rd IEEE/ACM International Conference on Automated Software Engineering, ASE 2018 - Montpellier, Frankreich
Dauer: 4 Sept. 2018 → …

Publikationsreihe

NameA-Mobile 2018 - Proceedings of the 1st International Workshop on Advances in Mobile App Analysis, co-located with ASE 2018

Konferenz

Konferenz1st International Workshop on Advances in Mobile App Analysis, A-Mobile 2018, co-located with the 33rd IEEE/ACM International Conference on Automated Software Engineering, ASE 2018
Land/GebietFrankreich
OrtMontpellier
Zeitraum4/09/18 → …

Fingerprint

Untersuchen Sie die Forschungsthemen von „Poking the bear: Lessons learned from probing three android malware datasets“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren