no code implementations • 22 May 2019 • Muhammad Ikram, Pierrick Beaume, Mohamed Ali Kaafar
We examine the graph features of mobile apps code by building weighted directed graphs of the API calls, and verify that malicious apps often share structural similarities that can be used to differentiate them from benign apps, even under a heavily "polluted" training set where a large majority of the apps are obfuscated.
Cryptography and Security