Ayuda
Ir al contenido

Dialnet


Characterization of Android Malware Families by a Reduced Set of Static Features

    1. [1] Instituto Tecnológico de Castilla y León

      Instituto Tecnológico de Castilla y León

      Burgos, España

    2. [2] Technical University of Cluj-Napoca

      Technical University of Cluj-Napoca

      Rumanía

    3. [3] Universidad de Burgos

      Universidad de Burgos

      Burgos, España

    4. [4] Universidad de Salamanca

      Universidad de Salamanca

      Salamanca, España

    5. [5] Universidad de Oviedo

      Universidad de Oviedo

      Oviedo, España

  • Localización: International Joint Conference SOCO’16-CISIS’16-ICEUTE’16: San Sebastián, Spain, October 19th-21st, 2016 Proceedings / coord. por Manuel Graña Romay, José Manuel López Guede, Oier Etxaniz, Álvaro Herrero Cosío, Héctor Quintián Pardo, Emilio Santiago Corchado Rodríguez, 2017, ISBN 978-3-319-47364-2, págs. 607-620
  • Idioma: inglés
  • Texto completo no disponible (Saber más ...)
  • Resumen
    • Due to the ever increasing amount and severity of attacks aimed at compromising smartphones in general, and Android devices in particular, much effort have been devoted in recent years to deal with such incidents. However, accurate detection of bad-intentioned Android apps still is an open challenge. As a follow-up step in an ongoing research, preset paper explores the selection of features for the characterization of Android-malware families. The idea is to select those features that are most relevant for characterizing malware families. In order to do that, an evolutionary algorithm is proposed to perform feature selection on the Drebin dataset, attaining interesting results on the most informative features for the characterization of representative families of existing Android malware.


Fundación Dialnet

Dialnet Plus

  • Más información sobre Dialnet Plus

Opciones de compartir

Opciones de entorno