Identifying Latent Android Malware from Application’s Description using LSTM
- Authors
- Wu, Zhiqiang; Chen, Xin; Lee, Scott Uk-Jin
- Issue Date
- Jan-2019
- Publisher
- Society of Convergence and Integrated Research
- Keywords
- Android malware; Permissions; LSTM; Consistency; Word2Vec
- Citation
- International Conference on Information, System and Convergence Applications, pp.40 - 42
- Indexed
- OTHER
- Journal Title
- International Conference on Information, System and Convergence Applications
- Start Page
- 40
- End Page
- 42
- URI
- https://scholarworks.bwise.kr/erica/handle/2021.sw.erica/3558
- Abstract
- Android is the most popular mobile system in the world where many applications provide convenient and diverse functions on top of it for our daily lives. However, a new Android malware is revealed every 10 seconds and the official application markets still consists of malicious and undetected applications due to the limitation of the existing malware detection techniques. In this paper, we propose an approach to identify the latent Android malware from application’s description using Long Short-Term Memory (LSTM) technique. The actual permissions requested by source code and permissions predicted from the description using semantics analysis to are compared to verify the consistency. If an application requests a permission undeclared in the description or homogeneous applications, it will be considered as a latent Android malware. This approach can surely provide more secure environment for the end-users before they install the applications.
- Files in This Item
-
Go to Link
- Appears in
Collections - COLLEGE OF COMPUTING > ERICA 컴퓨터학부 > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.