Static and Dynamic Analysis of Android Malware
Ankita Kapratwar, Fabio Di Troia, Mark Stamp
2017
Abstract
Static analysis relies on features extracted without executing code, while dynamic analysis extracts features based on execution (or emulation). In general, static analysis is more efficient, while dynamic analysis can be more informative, particularly in cases where the code is obfuscated. Static analysis of an Android application can, for example, rely on features extracted from the manifest file or the Java bytecode, while dynamic analysis of such applications might deal with features involving dynamic code loading and system calls. In this research, we apply machine learning techniques to analyze the relative effectiveness of particular static and dynamic features for detecting Android malware. We also carefully analyze the robustness of the scoring techniques under consideration.
DownloadPaper Citation
in Harvard Style
Kapratwar A., Di Troia F. and Stamp M. (2017). Static and Dynamic Analysis of Android Malware . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ForSE, (ICISSP 2017) ISBN 978-989-758-209-7, pages 653-662. DOI: 10.5220/0006256706530662
in Bibtex Style
@conference{forse17,
author={Ankita Kapratwar and Fabio Di Troia and Mark Stamp},
title={Static and Dynamic Analysis of Android Malware},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ForSE, (ICISSP 2017)},
year={2017},
pages={653-662},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006256706530662},
isbn={978-989-758-209-7},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ForSE, (ICISSP 2017)
TI - Static and Dynamic Analysis of Android Malware
SN - 978-989-758-209-7
AU - Kapratwar A.
AU - Di Troia F.
AU - Stamp M.
PY - 2017
SP - 653
EP - 662
DO - 10.5220/0006256706530662