Using dalvik opcodes for malware detection on android

17Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Over the last few years, computers and smartphones have become essential tools in our ways of communicating with each-other. Nowadays, the amount of applications in the Google store has grown exponentially, therefore, malware developers have introduced malicious applications in that market. The Android system uses the Dalvik virtual machine. Through reverse engineering, we may be able to get the different opcodes for each application. For this reason, in this paper an approach to detect malware on Android is presented, by using the techniques of reverse engineering and putting an emphasis on operational codes used for these applications. After obtaining these opcodes, machine learning techniques are used to classify apps.

Cite

CITATION STYLE

APA

De La Puerta, J. G., Sanz, B., Santos, I., & Bringas, P. G. (2015). Using dalvik opcodes for malware detection on android. In Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science) (Vol. 9121, pp. 416–426). Springer Verlag. https://doi.org/10.1007/978-3-319-19644-2_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free