Adaptive Android APKs Reverse Engineering for Features Processing in Machine Learning Malware Detection.

Autor: Gyunka, Benjamin Aruwa, Oladele, Aro Taye, Adegoke, Ojeniyi
Předmět:
Zdroj: International Journal of Data Science (IJoDS); Jun2023, Vol. 4 Issue 1, p10-25, 16p
Abstrakt: The key component that makes the detection of android malware possible is the availability of the right triggers and pointers, which are found in the Android application packages, known as features or attributes. These are fundamental in the training of the different machine learning algorithms to produce the required detection model. The process of extracting these attributes or features, from the Android application packages, is known as reverse engineering. This paper delved into the experimental detail processes of applying reverse engineering procedure, using Sublime Text 2 and Androguard Plugin, on Android Application packages for the extraction of, particularly permissions, which are the targeted features. The study further discussed the cleaning stages, using NotePad++, Microsoft Excel Worksheet, and MS Word, to sort out all the relevant and important features by removing all the noisy ones. A total of 1500 Android apps were downloaded from both benign and malicious sources and used for the experiment. The cleaned or important features extracted from these application packages at the end of the reverse engineering processes are 162 in total and these were further used to form a feature binary matrix of size 1500 by 163 (including the class features). [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index