Skip to Main Content
Intelligent Mobile Malware Detection
book

Intelligent Mobile Malware Detection

by Tony Thomas, Roopak Surendran, Teenu John, Mamoun Alazab
December 2022
Intermediate to advanced content levelIntermediate to advanced
190 pages
4h 56m
English
CRC Press
Content preview from Intelligent Mobile Malware Detection

5Detection Using Graph Centrality Measures

DOI: 10.1201/9781003121510-5

In the Chapter 4, we showed that TAN model can be used to combine the static and dynamic features for accurate malware detection. In TAN-based detection model, it is possible for a malware developer to evade API call and permission-based classifiers by employing adversarial attacks[126].

Adversarial attacks on Android malware detection mechanisms are really threatening. They can make an attacker to gain unauthorized access to a device. In ML-based malware detection, feature values are extremely important since a slight change in the feature values can affect the output of the classifier. In addition to that, many adversarial attacks are transferable. That is the attacks ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level

Hardening Your Macs: Keeping Apple Computers Safe at the Hardware and Software Level

Jesus Vigo, Jr.
Android Malware and Analysis

Android Malware and Analysis

Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781000824988