Identifying Latent Android Malware from Application’s Description using LSTM
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wu, Zhiqiang | - |
dc.contributor.author | Chen, Xin | - |
dc.contributor.author | Lee, Scott Uk-Jin | - |
dc.date.accessioned | 2021-06-22T10:26:07Z | - |
dc.date.available | 2021-06-22T10:26:07Z | - |
dc.date.created | 2021-02-18 | - |
dc.date.issued | 2019-01 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/3558 | - |
dc.description.abstract | Android is the most popular mobile system in the world where many applications provide convenient and diverse functions on top of it for our daily lives. However, a new Android malware is revealed every 10 seconds and the official application markets still consists of malicious and undetected applications due to the limitation of the existing malware detection techniques. In this paper, we propose an approach to identify the latent Android malware from application’s description using Long Short-Term Memory (LSTM) technique. The actual permissions requested by source code and permissions predicted from the description using semantics analysis to are compared to verify the consistency. If an application requests a permission undeclared in the description or homogeneous applications, it will be considered as a latent Android malware. This approach can surely provide more secure environment for the end-users before they install the applications. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Society of Convergence and Integrated Research | - |
dc.title | Identifying Latent Android Malware from Application’s Description using LSTM | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Scott Uk-Jin | - |
dc.identifier.bibliographicCitation | International Conference on Information, System and Convergence Applications, pp.40 - 42 | - |
dc.relation.isPartOf | International Conference on Information, System and Convergence Applications | - |
dc.citation.title | International Conference on Information, System and Convergence Applications | - |
dc.citation.startPage | 40 | - |
dc.citation.endPage | 42 | - |
dc.type.rims | ART | - |
dc.description.journalClass | 3 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | other | - |
dc.subject.keywordAuthor | Android malware | - |
dc.subject.keywordAuthor | Permissions | - |
dc.subject.keywordAuthor | LSTM | - |
dc.subject.keywordAuthor | Consistency | - |
dc.subject.keywordAuthor | Word2Vec | - |
dc.identifier.url | https://hhhwwwuuu.github.io/assets/pdf/Zhiqiang6.pdf | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
55 Hanyangdeahak-ro, Sangnok-gu, Ansan, Gyeonggi-do, 15588, Korea+82-31-400-4269 sweetbrain@hanyang.ac.kr
COPYRIGHT © 2021 HANYANG UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.