Authors
Laya Taheri, Andi Fitriah Abdul Kadir, Arash Habibi Lashkari
Publication date
2019/10/1
Conference
2019 international Carnahan conference on security technology (ICCST)
Pages
1-8
Publisher
IEEE
Description
Android OS-based mobile devices have attracted numerous end-users since they are convenient to work with and offer a variety of features. As a result, Android has become one of the most important targets for attackers to launch their malicious intentions. Every year, researchers propose a novel Android malware analyzer framework to defend against real-world Android malware Apps. The researchers require an inclusive Android dataset to assess their Android analyzers. However, generating a comprehensive Android malware dataset is a challenging concept in malware scrutiny fields. In 2018, we made the first part of our Android malware dataset, CICAndMal2017 [16], publicly available while performing dynamic analyses on real smartphones. In this paper, we provide the second part of the CICAndMal2017 dataset [16] publicly available which includes permissions and intents as static features, and API calls …
Total citations
202020212022202320242147525321
Scholar articles
L Taheri, AFA Kadir, AH Lashkari - 2019 international Carnahan conference on security …, 2019