Predicting Android malware combining permissions and API call sequences.
Xin ChenHaihua YuDongjin YuJie ChenXiaoxiao SunPublished in: Softw. Qual. J. (2023)
Keyphrases
- malware detection
- api calls
- application programming interface
- hidden markov models
- cd rom
- source code
- mobile devices
- access control
- anomaly detection
- static analysis
- sequential patterns
- software engineering
- end users
- detect malicious
- third party
- reverse engineering
- smart phones
- sequence alignment
- application developers
- mobile platform
- mobile robot
- malicious code
- high level