Skip to main content

Data-Driven Android Malware Intelligence: A Survey

  • Conference paper
  • First Online:
Machine Learning for Cyber Security (ML4CS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11806))

Included in the following conference series:

Abstract

Android has dominated the smartphone market and become the most popular mobile operating system. This rapidly increasing market share of Android has contributed to the boom of Android malware in numbers and in varieties. There exist many techniques which are proposed to accurately detect malware, e.g., software engineering-based techniques and machine learning (ML)-based techniques. In this paper, our main contributions are threefold: We reviewed the existing analysis techniques for Android malware detection; We focused on the code analysis based detection techniques under the ML frameworks; We gave the future research challenges and directions about Android malware analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.idc.com/promo/smartphone-market-share/os.

  2. 2.

    https://www.gdatasoftware.com/.

  3. 3.

    https://play.google.com/store.

  4. 4.

    https://www.wandoujia.com/.

  5. 5.

    http://www.anzhi.com/.

  6. 6.

    https://www.appbrain.com/stats/number-of-android-apps.

  7. 7.

    https://www.gdatasoftware.com/.

  8. 8.

    https://sable.github.io/soot/.

  9. 9.

    https://www.virustotal.com/.

References

  1. Aafer, Y., Du, W., Yin, H.: DroidAPIMiner: mining API-level features for robust malware detection in Android. In: Zia, T., Zomaya, A., Varadharajan, V., Mao, M. (eds.) SecureComm 2013. LNICSSITE, vol. 127, pp. 86–103. Springer, Cham (2013). https://doi.org/10.1007/978-3-319-04283-1_6

    Chapter  Google Scholar 

  2. Afonso, V.M., et al.: Going native: using a large-scale analysis of Android apps to create a practical native-code sandboxing policy. In: NDSS. The Internet Society (2016)

    Google Scholar 

  3. Allamanis, M., Barr, E.T., Devanbu, P.T., Sutton, C.A.: A survey of machine learning for big code and naturalness. ACM Comput. Surv. 51(4), 81:1–81:37 (2018)

    Article  Google Scholar 

  4. Allix, K., Bissyandé, T.F., Klein, J., Traon, Y.L.: Androzoo: collecting millions of Android apps for the research community. In: MSR, pp. 468–471. ACM (2016)

    Google Scholar 

  5. Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., Rieck, K.: DREBIN: effective and explainable detection of Android malware in your pocket. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23–26 February 2014 (2014)

    Google Scholar 

  6. Arshad, S., Shah, M.A., Khan, A., Ahmed, M.: Android malware detection & protection: a survey. Int. J. Adv. Comput. Sci. Appl. 7(2), 463–475 (2016)

    Google Scholar 

  7. Arzt, S., et al.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2014, Edinburgh, United Kingdom, 09–11 June 2014, pp. 259–269 (2014)

    Google Scholar 

  8. Atici, M.A., Sagiroglu, S., Dogru, I.A.: Android malware analysis approach based on control flow graphs and machine learning algorithms. In: 2016 4th International Symposium on Digital Forensic and Security (ISDFS), pp. 26–31. IEEE (2016)

    Google Scholar 

  9. Backes, M., Bugiel, S., Gerling, S., von Styp-Rekowsky, P.: Android security framework: extensible multi-layered access control on Android. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, 8–12 December 2014, pp. 46–55 (2014)

    Google Scholar 

  10. Bartel, A., Klein, J., Traon, Y.L., Monperrus, M.: Dexpler: converting Android dalvik bytecode to jimple for static analysis with soot. In: Proceedings of the ACM SIGPLAN International Workshop on State of the Art in Java Program analysis, SOAP 2012, Beijing, China, 14 June 2012, pp. 27–38 (2012)

    Google Scholar 

  11. Baskaran, B., Ralescu, A.: A study of Android malware detection techniques and machine learning. In: Proceedings of the 27th Modern Artificial Intelligence and Cognitive Science Conference 2016, Dayton, OH, USA, 22–23 April 2016, pp. 15–23 (2016)

    Google Scholar 

  12. Bellard, F.: QEMU, a fast and portable dynamic translator. In: Proceedings of the FREENIX Track: 2005 USENIX Annual Technical Conference, Anaheim, CA, USA, 10–15 April 2005, pp. 41–46 (2005)

    Google Scholar 

  13. Beyer, D., Fararooy, A.: A simple and effective measure for complex low-level dependencies. In: ICPC, pp. 80–83. IEEE Computer Society (2010)

    Google Scholar 

  14. Bläsing, T., Batyuk, L., Schmidt, A., Çamtepe, S.A., Albayrak, S.: An Android application sandbox system for suspicious software detection. In: 5th International Conference on Malicious and Unwanted Software, MALWARE 2010, Nancy, France, 19–20 October 2010, pp. 55–62 (2010)

    Google Scholar 

  15. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for Android. In: Proceedings of the 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, Co-Located with CCS 2011, Chicago, IL, USA, 17 October 2011, pp. 15–26 (2011)

    Google Scholar 

  16. Chen, K., et al.: Finding unknown malice in 10 seconds: mass vetting for new threats at the Google-play scale. In: USENIX Security Symposium, pp. 659–674. USENIX Association (2015)

    Google Scholar 

  17. Churcher, N.I., Shepperd, M.J.: Comments on “a metrics suite for object oriented design”. IEEE Trans. Softw. Eng. 21(3), 263–265 (1995)

    Article  Google Scholar 

  18. Costa-jussà, M.R., Allauzen, A., Barrault, L., Cho, K., Schwenk, H.: Introduction to the special issue on deep learning approaches for machine translation. Comput. Speech Lang. 46, 367–373 (2017)

    Article  Google Scholar 

  19. Desnos, A., Lantz, P.: DroidBox: an Android application sandbox for dynamic analysis. Technical report, Lund University, Lund, Sweden (2011)

    Google Scholar 

  20. Dumitras, T.: Automatic feature engineering: learning to detect malware by mining the scientific literature (2017)

    Google Scholar 

  21. Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2010, Vancouver, BC, Canada, 4–6 October 2010, pp. 393–407 (2010)

    Google Scholar 

  22. Enck, W., Ongtang, M., McDaniel, P.D.: On lightweight mobile phone application certification. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, 9–13 November 2009, pp. 235–245 (2009)

    Google Scholar 

  23. Enck, W., Ongtang, M., McDaniel, P.D.: Understanding Android security. IEEE Secur. Priv. 7(1), 50–57 (2009)

    Article  Google Scholar 

  24. Feng, P., Ma, J., Sun, C., Xu, X., Ma, Y.: A novel dynamic Android malware detection system with ensemble learning. IEEE Access 6, 30996–31011 (2018)

    Article  Google Scholar 

  25. Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of Android malware through static analysis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 576–587. ACM (2014)

    Google Scholar 

  26. Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: semantics-based detection of Android malware through static analysis. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, 16–22 November 2014, pp. 576–587 (2014)

    Google Scholar 

  27. Feng, Y., Bastani, O., Martins, R., Dillig, I., Anand, S.: Automated synthesis of semantic malware signatures using maximum satisfiability. In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, 26 February–1 March 2017 (2017)

    Google Scholar 

  28. Feng, Y., Wang, X., Dillig, I., Lin, C.: EXPLORER: query- and demand-driven exploration of interprocedural control flow properties. In: OOPSLA, pp. 520–534. ACM (2015)

    Google Scholar 

  29. Gama, J., Zliobaite, I., Bifet, A., Pechenizkiy, M., Bouchachia, A.: A survey on concept drift adaptation. ACM Comput. Surv. 46(4), 44:1–44:37 (2014)

    Article  Google Scholar 

  30. Hinton, G., et al.: Deep neural networks for acoustic modeling in speech recognition: the shared views of four research groups. IEEE Sig. Process. Mag. 29(6), 82–97 (2012)

    Article  Google Scholar 

  31. Hou, S., Saas, A., Chen, L., Ye, Y.: Deep4maldroid: a deep learning framework for Android malware detection based on Linux kernel system call graphs. In: WI Workshops, pp. 104–111. IEEE Computer Society (2016)

    Google Scholar 

  32. Hou, S., Ye, Y., Song, Y., Abdulhayoglu, M.: HinDroid: an intelligent Android malware detection system based on structured heterogeneous information network. In: Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, 13–17 August 2017, pp. 1507–1515 (2017)

    Google Scholar 

  33. Hsien-De Huang, T., Kao, H.-Y.: R2–D2: color-inspired convolutional neural network (CNN)-based Android malware detections. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 2633–2642. IEEE (2018)

    Google Scholar 

  34. Jiang, J.J., Wen, S., Yu, S., Xiang, Y., Zhou, W.: Identifying propagation sources in networks: state-of-the-art and comparative studies. IEEE Commun. Surv. Tutor. 19(1), 465–481 (2017)

    Article  Google Scholar 

  35. Jordaney, R., et al.: Transcend: detecting concept drift in malware classification models. In: 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, 16–18 August 2017, pp. 625–642 (2017)

    Google Scholar 

  36. Kang, B., Yerima, S.Y., McLaughlin, K., Sezer, S.: N-opcode analysis for Android malware classification and categorization. In: 2016 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1–7. IEEE (2016)

    Google Scholar 

  37. Li, C.M., Manyà, F.: MaxSAT, hard and soft constraints. In: Handbook of Satisfiability, pp. 613–631 (2009)

    Google Scholar 

  38. Li, L., et al.: Static analysis of Android apps: a systematic literature review. Inf. Softw. Technol. 88, 67–95 (2017)

    Article  Google Scholar 

  39. Li, L., et al.: Androzoo++: collecting millions of Android apps and their metadata for the research community. CoRR, abs/1709.05281 (2017)

    Google Scholar 

  40. Liu, L., de Vel, O.Y., Han, Q., Zhang, J., Xiang, Y.: Detecting and preventing cyber insider threats: a survey. IEEE Commun. Surv. Tutor. 20(2), 1397–1417 (2018)

    Article  Google Scholar 

  41. Mahmood, R., Mirzaei, N., Malek, S.: EvoDroid: segmented evolutionary testing of Android apps. In: SIGSOFT FSE, pp. 599–609. ACM (2014)

    Google Scholar 

  42. Mariconti, E., Onwuzurike, L., Andriotis, P., Cristofaro, E.D., Ross, G.J., Stringhini, G.: MaMaDroid: detecting Android malware by building Markov chains of behavioral models. In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, 26 February–1 March 2017 (2017)

    Google Scholar 

  43. McCabe, T.J.: A complexity measure. IEEE Trans. Softw. Eng. 2(4), 308–320 (1976)

    Article  MathSciNet  Google Scholar 

  44. McLaughlin, N., et al.: Deep Android malware detection. In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, 22–24 March 2017, pp. 301–308 (2017)

    Google Scholar 

  45. Muñoz, A., Martín, I., Guzmán, A., Hernández, J.A.: Android malware detection from Google play meta-data: selection of important features. In: CNS, pp. 701–702. IEEE (2015)

    Google Scholar 

  46. Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: Context-aware, adaptive, and scalable Android malware detection through online learning. IEEE Trans. Emerg. Top. Comput. Intell. 1(3), 157–175 (2017)

    Article  Google Scholar 

  47. Narayanan, A., Chandramohan, M., Chen, L., Liu, Y.: A multi-view context-aware approach to Android malware detection and malicious code localization. Empirical Softw. Eng. 23(3), 1222–1274 (2018)

    Article  Google Scholar 

  48. Nguyen, T.D., Nguyen, A.T., Phan, H.D., Nguyen, T.N.: Exploring API embedding for API usages and applications. In: Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, 20–28 May 2017, pp. 438–449 (2017)

    Google Scholar 

  49. Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: versatile protection for smartphones. In: Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6–10 December 2010, pp. 347–356 (2010)

    Google Scholar 

  50. Protsenko, M., Müller, T.: Android malware detection based on software complexity metrics. In: Eckert, C., Katsikas, S.K., Pernul, G. (eds.) TrustBus 2014. LNCS, vol. 8647, pp. 24–35. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-09770-1_3

    Chapter  Google Scholar 

  51. Qiu, J., Luo, W., Nepal, S., Zhang, J., Xiang, Y., Pan, L.: Keep calm and know where to focus: measuring and predicting the impact of Android malware. In: Gan, G., Li, B., Li, X., Wang, S. (eds.) ADMA 2018. LNCS (LNAI), vol. 11323, pp. 238–254. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05090-0_21

    Chapter  Google Scholar 

  52. Qiu, J., Luo, W., Pan, L., Tai, Y., Zhang, J., Xiang, Y.: Predicting the impact of Android malicious samples via machine learning. IEEE Access 7, 66304–66316 (2019)

    Article  Google Scholar 

  53. Rasthofer, S., Arzt, S., Miltenberger, M., Bodden, E.: Harvesting runtime values in Android applications that feature anti-analysis techniques. In: NDSS. The Internet Society (2016)

    Google Scholar 

  54. Rastogi, V., Chen, Y., Enck, W.: AppsPlayground: automatic security analysis of smartphone applications. In: Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013, San Antonio, TX, USA, 18–20 February 2013, pp. 209–220 (2013)

    Google Scholar 

  55. Reina, A., Fattori, A., Cavallaro, L.: A system call-centric analysis and stimulation technique to automatically reconstruct Android malware behaviors. In: EuroSec, April 2013

    Google Scholar 

  56. Sabottke, C., Suciu, O., Dumitras, T.: Vulnerability disclosure in the age of social media: exploiting Twitter for predicting real-world exploits. In: USENIX Security Symposium, pp. 1041–1056. USENIX Association (2015)

    Google Scholar 

  57. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G., Álvarez, G.: PUMA: permission usage to detect malware in Android. In: Herrero, Á., et al. (eds.) International Joint Conference CISIS 2012-ICEUTE 2012-SOCO 2012 Special Sessions. AISC, vol. 189, pp. 289–298. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33018-6_30

    Chapter  Google Scholar 

  58. Sato, R., Chiba, D., Goto, S.: Detecting Android malware by analyzing manifest files. Proc. Asia-Pac. Adv. Netw. 36(23–31), 17 (2013)

    Google Scholar 

  59. Sebastián, M., Rivera, R., Kotzias, P., Caballero, J.: AVclass: a tool for massive malware labeling. In: Monrose, F., Dacier, M., Blanc, G., Garcia-Alfaro, J. (eds.) RAID 2016. LNCS, vol. 9854, pp. 230–253. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45719-2_11

    Chapter  Google Scholar 

  60. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: “Andromaly”: a behavioral malware detection framework for Android devices. J. Intell. Inf. Syst. 38(1), 161–190 (2012)

    Article  Google Scholar 

  61. Spreitzenbarth, M., Freiling, F.C., Echtler, F., Schreck, T., Hoffmann, J.: Mobile-sandbox: having a deeper look into Android applications. In: SAC, pp. 1808–1815. ACM (2013)

    Google Scholar 

  62. Suarez-Tangil, G., Stringhini, G.: Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned. CoRR, abs/1801.08115 (2018)

    Google Scholar 

  63. Sun, N., Zhang, J., Rimba, P., Gao, S., Zhang, L.Y., Xiang, Y.: Data-driven cybersecurity incident prediction: a survey. IEEE Commun. Surv. Tutor. 21(2), 1744–1772 (2019)

    Article  Google Scholar 

  64. Sun, Y., Kamel, M.S., Wong, A.K.C., Wang, Y.: Cost-sensitive boosting for classification of imbalanced data. Pattern Recogn. 40(12), 3358–3378 (2007)

    Article  Google Scholar 

  65. Sun, Z., Ampornpunt, N., Varma, M., Vishwanathan, S.: Multiple kernel learning and the SMO algorithm. In: Advances in Neural Information Processing Systems, pp. 2361–2369 (2010)

    Google Scholar 

  66. Tam, K., Feizollah, A., Anuar, N.B., Salleh, R., Cavallaro, L.: The evolution of Android malware and Android analysis techniques. ACM Comput. Surv. 49(4), 76:1–76:41 (2017)

    Article  Google Scholar 

  67. Tang, W., Jin, G., He, J., Jiang, X.: Extending Android security enforcement with a security distance model. In: 2011 International Conference on Internet Technology and Applications, pp. 1–4. IEEE (2011)

    Google Scholar 

  68. Vidas, T., Tan, J., Nahata, J., Tan, C.L., Christin, N., Tague, P.: A5: automated analysis of adversarial Android applications. In: SPSM@CCS, pp. 39–50. ACM (2014)

    Google Scholar 

  69. Wei, F., Li, Y., Roy, S., Ou, X., Zhou, W.: Deep ground truth analysis of current Android malware. In: Polychronakis, M., Meier, M. (eds.) DIMVA 2017. LNCS, vol. 10327, pp. 252–276. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60876-1_12

    Chapter  Google Scholar 

  70. Weiss, K.R., Khoshgoftaar, T.M., Wang, D.: A survey of transfer learning. J. Big Data 3, 9 (2016)

    Article  Google Scholar 

  71. Wen, S., Haghighi, M.S., Chen, C., Xiang, Y., Zhou, W., Jia, W.: A sword with two edges: propagation studies on both positive and negative information in online social networks. IEEE Trans. Comput. 64(3), 640–653 (2015)

    Article  MathSciNet  Google Scholar 

  72. Wong, M.Y., Lie, D.: IntelliDroid: a targeted input generator for the dynamic analysis of Android malware. In: NDSS. The Internet Society (2016)

    Google Scholar 

  73. Wu, C., Zhou, Y., Patel, K., Liang, Z., Jiang, X.: AirBag: boosting smartphone resistance to malware infection. In: 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, 23–26 February 2014 (2014)

    Google Scholar 

  74. Wu, D., Mao, C., Wei, T., Lee, H., Wu, K.: DroidMat: Android malware detection through manifest and API calls tracing. In: Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, 9–10 August 2012, pp. 62–69 (2012)

    Google Scholar 

  75. Wu, T., Wen, S., Xiang, Y., Zhou, W.: Twitter spam detection: survey of new approaches and comparative study. Comput. Secur. 76, 265–284 (2018)

    Article  Google Scholar 

  76. Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: IEEE Symposium on Security and Privacy, pp. 590–604. IEEE Computer Society (2014)

    Google Scholar 

  77. Yan, L., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic Android malware analysis. In: Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, 8–10 August 2012, pp. 569–584 (2012)

    Google Scholar 

  78. Yang, C., Xu, Z., Gu, G., Yegneswaran, V., Porras, P.: DroidMiner: automated mining and characterization of fine-grained malicious behaviors in Android applications. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 163–182. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11203-9_10

    Chapter  Google Scholar 

  79. Ye, Y., Li, T., Adjeroh, D.A., Iyengar, S.S.: A survey on malware detection using data mining techniques. ACM Comput. Surv. 50(3), 41:1–41:40 (2017)

    Article  Google Scholar 

  80. Yuan, Z., Lu, Y., Wang, Z., Xue, Y.: Droid-sec: deep learning in Android malware detection. In: ACM SIGCOMM 2014 Conference, SIGCOMM 2014, Chicago, IL, USA, 17–22 August 2014, pp. 371–372 (2014)

    Google Scholar 

  81. Yuan, Z., Lu, Y., Xue, Y.: Droiddetector: Android malware characterization and detection using deep learning. Tsinghua Sci. Technol. 21(1), 114–123 (2016)

    Article  Google Scholar 

  82. Zhang, J., Xiang, Y., Wang, Y., Zhou, W., Xiang, Y., Guan, Y.: Network traffic classification using correlation information. IEEE Trans. Parallel Distrib. Syst. 24(1), 104–117 (2013)

    Article  Google Scholar 

  83. Zhang, M., Duan, Y., Yin, H., Zhao, Z.: Semantics-aware Android malware classification using weighted contextual API dependency graphs. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, 3–7 November 2014, pp. 1105–1116 (2014)

    Google Scholar 

  84. Zheng, C., et al.: SmartDroid: an automatic system for revealing UI-based trigger conditions in Android applications. In: SPSM@CCS, pp. 93–104. ACM (2012)

    Google Scholar 

  85. Zheng, M., Sun, M., Lui, J.C.S.: Droid analytics: a signature based analytic system to collect, extract, analyze and associate Android malware. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013/11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2013/12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, 16–18 July 2013, pp. 163–171 (2013)

    Google Scholar 

  86. Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative Android markets. In: 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, 5–8 February 2012 (2012)

    Google Scholar 

  87. Zhu, Z., Dumitras, T.: FeatureSmith: automatically engineering features for malware detection by mining the security literature. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016, pp. 767–778 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junyang Qiu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qiu, J. et al. (2019). Data-Driven Android Malware Intelligence: A Survey. In: Chen, X., Huang, X., Zhang, J. (eds) Machine Learning for Cyber Security. ML4CS 2019. Lecture Notes in Computer Science(), vol 11806. Springer, Cham. https://doi.org/10.1007/978-3-030-30619-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30619-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30618-2

  • Online ISBN: 978-3-030-30619-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics