Android malware detection using local binary pattern and principal component analysis

6Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays, analysis methods based on big data have been widely used in malicious software detection. Since Android has become the dominator of smartphone operating system market, the number of Android malicious applications are increasing rapidly as well, which attracts attention of malware attackers and researchers alike. Due to the endless evolution of the malware, it is critical to apply the analysis methods based on machine learning to detect malwares and stop them from leakaging our privacy information. In this paper, we propose a novel Android malware detection method based on binary texture feature recognition by Local Binary Pattern and Principal Component Analysis, which can visualize malware and detect malware accurately. Also, our method analyzes malware binary directly without any decompiler, sandbox or virtual machines, which avoid time and resource consumption caused by decompiler or monitor in this process. Experimentation on 5127 benigns and 5560 malwares shows that we obtain a detection accuracy of 90%.

Cite

CITATION STYLE

APA

Wu, Q., Qin, Z., Zhang, J., Yin, H., Yang, G., & Hu, K. (2017). Android malware detection using local binary pattern and principal component analysis. In Communications in Computer and Information Science (Vol. 727, pp. 262–275). Springer Verlag. https://doi.org/10.1007/978-981-10-6385-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free