Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning

AI-generated keywords: Android Malware Detection Droidetec LSTM Network Feature Extraction Malicious Code Localization

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Droidetec is a deep learning-based method for Android malware detection and malicious code localization
  • It models an application program as a natural language sequence
  • Utilizes a novel feature extraction method to derive behavior sequences from Android applications
  • Employs bi-directional Long Short Term Memory (LSTM) network for malware detection
  • Each unit in the extracted behavior sequence is represented as a vector, enabling automatic analysis of semantics and identification of malicious code
  • Achieved an accuracy rate of 97.22% with an F1-score of 98.21%
  • Had a hit rate of 91% in accurately identifying malicious code segments
  • Offers an innovative solution to the long-standing challenge of manual search for potential malicious code in Android applications
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Zhuo Ma, Haoran Ge, Zhuzhu Wang, Yang Liu, Ximeng Liu

Abstract: Android malware detection is a critical step towards building a security credible system. Especially, manual search for the potential malicious code has plagued program analysts for a long time. In this paper, we propose Droidetec, a deep learning based method for android malware detection and malicious code localization, to model an application program as a natural language sequence. Droidetec adopts a novel feature extraction method to derive behavior sequences from Android applications. Based on that, the bi-directional Long Short Term Memory network is utilized for malware detection. Each unit in the extracted behavior sequence is inventively represented as a vector, which allows Droidetec to automatically analyze the semantics of sequence segments and eventually find out the malicious code. Experiments with 9616 malicious and 11982 benign programs show that Droidetec reaches an accuracy of 97.22% and an F1-score of 98.21%. In all, Droidetec has a hit rate of 91% to properly find out malicious code segments.

Submitted to arXiv on 10 Feb. 2020

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2002.03594v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In the field of building a secure and credible system, detecting Android malware is a crucial step. Manual searching for potential malicious code has posed a challenge for program analysts for a long time. To address this issue, the authors present Droidetec - a deep learning-based method for Android malware detection and malicious code localization. Droidetec models an application program as a natural language sequence and utilizes a novel feature extraction method to derive behavior sequences from Android applications. The bi-directional Long Short Term Memory (LSTM) network is then employed for malware detection. Each unit in the extracted behavior sequence is represented as a vector which enables Droidetec to automatically analyze the semantics of sequence segments and identify malicious code. The effectiveness of Droidetec was demonstrated through experiments involving 9616 malicious and 11982 benign programs. The results show that Droidetec achieved an impressive accuracy rate of 97.22% with an F1-score of 98.21%. It also had a hit rate of 91% in accurately identifying malicious code segments. Overall, the proposed approach presents promising results in Android malware detection and offers an innovative solution to the long-standing challenge of manual search for potential malicious code.
Created on 25 Dec. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.