N-opcode Analysis for Android Malware Classification and Categorization
dc.cclicence | CC-BY-NC | en |
dc.contributor.author | Yerima, Suleiman | en |
dc.contributor.author | Sezer, Sakir | en |
dc.contributor.author | Kang, B. | en |
dc.contributor.author | McLaughlin, K. | en |
dc.date.acceptance | 2016 | en |
dc.date.accessioned | 2018-10-31T13:47:16Z | |
dc.date.available | 2018-10-31T13:47:16Z | |
dc.date.issued | 2016-06 | |
dc.description | The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link. | en |
dc.description.abstract | Malware detection is a growing problem particularly on the Android mobile platform due to its increasing popularity and accessibility to numerous third party app markets. This has also been made worse by the increasingly sophisticated detection avoidance techniques employed by emerging malware families. This calls for more effective techniques for detection and classification of Android malware. Hence, in this paper we present an n-opcode analysis based approach that utilizes machine learning to classify and categorize Android malware. This approach enables automated feature discovery that eliminates the need for applying expert or domain knowledge to define the needed features. Our experiments on 2520 samples that were performed using up to 10-gram opcode features showed that an f-measure of 98% is achievable using this approach. | en |
dc.exception.reason | author was not DMU staff at time of publication, available on Queens Uni repository | en |
dc.exception.ref2021codes | 254a | en |
dc.funder | N/A | en |
dc.identifier.citation | Kang, B., Yerima, S. Y., McLaughlin, K., Sezer, S. (2016) N-opcode analysis for android malware classification and categorization. In: Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), London, UK. June 2016. | en |
dc.identifier.doi | https://doi.org/10.1109/cybersecpods.2016.7502343 | |
dc.identifier.uri | https://pure.qub.ac.uk/portal/en/publications/nopcode-analysis-for-android-malware-classification-and-categorization(6fe45281-f302-4df8-9ccc-2acfe0059b38).html | |
dc.identifier.uri | http://hdl.handle.net/2086/16949 | |
dc.language.iso | en | en |
dc.peerreviewed | Yes | en |
dc.projectid | N/A | en |
dc.publisher | IEEE | en |
dc.researchinstitute | Cyber Technology Institute (CTI) | en |
dc.subject | n-grams | en |
dc.subject | machine learning | en |
dc.subject | feature selection | en |
dc.subject | android malware | en |
dc.subject | malware detection | en |
dc.subject | malware reverse engineering | en |
dc.subject | dalvik bytecode | en |
dc.subject | invasive software | en |
dc.title | N-opcode Analysis for Android Malware Classification and Categorization | en |
dc.type | Conference | en |