techniques are applied for the automatic extraction of
Android malicious behaviors.
REFERENCES
Aafer, Y., Du, W., and Yin, H. (2013). Droidapiminer:
Mining api-level features for robust malware detec-
tion in android. In International Conference on Se-
curity and Privacy in Communication Systems, pages
86–103. Springer.
Arp, D., Spreitzenbarth, M., Hubner, M., Gascon, H., and
Rieck, K. (2014). Drebin: Effective and explain-
able detection of android malware in your pocket. In
NDSS.
Aung, Z. and Zaw, W. (2013). Permission-based android
malware detection. International Journal of Scientific
and Technology Research, 2(3):228–234.
Burguera, I., Zurutuza, U., and Nadjm-Tehrani, S. (2011).
Crowdroid: behavior-based malware detection system
for android. In Proceedings of the 1st ACM workshop
on Security and privacy in smartphones and mobile
devices, pages 15–26. ACM.
Canfora, G., Medvet, E., Mercaldo, F., and Visaggio, C. A.
(2015). Detecting android malware using sequences
of system calls. In Proceedings of the 3rd Interna-
tional Workshop on Software Development Lifecycle
for Mobile, pages 13–20. ACM.
Cheng, J. Y.-C., Tsai, T.-S., and Yang, C.-S. (2013). An
information retrieval approach for malware classifica-
tion based on windows api calls. In 2013 International
Conference on Machine Learning and Cybernetics.
Christopher D. Manning, Prabhakar Raghavan, H. S.
(2009). An introduction to information retrieval.
Cambridge University Press.
Dam, K.-H.-T. and Touili, T. (2016). Automatic extraction
of malicious behaviors. In 11th International Con-
ference on Malicious and Unwanted Software 2016
(MALCON 2016), Fajardo, Puerto Rico.
Dimja
ˇ
sevic, M., Atzeni, S., Ugrina, I., and Rakamaric, Z.
(2015). Android malware detection based on system
calls. University of Utah, Tech. Rep.
Jang, J.-w., Kang, H., Woo, J., Mohaisen, A., and Kim,
H. K. (2016). Andro-dumpsys: anti-malware sys-
tem based on the similarity of malware creator and
malware centric information. computers & security,
58:125–138.
Malik, S. and Khatter, K. (2016). System call analysis of
android malware families. Indian Journal of Science
and Technology, 9(21).
Masud, M. M., Khan, L., and Thuraisingham, B. (2008). A
scalable multi-level feature extraction technique to de-
tect malicious executables. Information Systems Fron-
tiers.
Robertson, S. and Zaragoza, H. (2009). The probabilistic
relevance framework: BM25 and beyond. Now Pub-
lishers Inc.
Robertson, S. E., Walker, S., Jones, S., Hancock-Beaulieu,
M. M., Gatford, M., et al. (1995). Okapi at trec-3.
NIST SPECIAL PUBLICATION SP.
Santos, I., Ugarte-Pedrero, X., Brezo, F., Bringas, P. G., and
G
´
omez-Hidalgo, J. M. (2013). Noa: An information
retrieval based malware detection system. Computing
and Informatics.
Sharma, A. and Dash, S. K. (2014). Mining api calls and
permissions for android malware detection. In Inter-
national Conference on Cryptology and Network Se-
curity, pages 191–205. Springer.
Singhal, A., Buckley, C., and Mitra, M. (1996). Pivoted
document length normalization. In Proceedings of the
19th annual international ACM SIGIR conference on
Research and development in information retrieval.
Singhal, A., Choi, J., Hindle, D., Lewis, D. D., and Pereira,
F. (1999). At&t at trec-7. NIST SPECIAL PUBLICA-
TION SP.
Singhal, A. and Kaszkiel, M. (2001). A case study in web
search using trec algorithms. In Proceedings of the
10th international conference on World Wide Web.
Song, F. and Touili, T. (2014). Model-checking for an-
droid malware detection. In Asian Symposium on Pro-
gramming Languages and Systems, pages 216–235.
Springer.
Talha, K. A., Alper, D. I., and Aydin, C. (2015). {APK}
auditor: Permission-based android malware detection
system. Digital Investigation, 13:1 – 14.
Tchakount
´
e, F. (2014). Permission-based malware detec-
tion mechanisms on android: Analysis and perspec-
tives. JOURNAL OF COMPUTER SCIENCE, 1(2).
Yao, J., Wang, J., Li, Z., Li, M., and Ma, W.-Y. (2006).
Ranking web news via homepage visual layout and
cross-site voting. In European Conference on Infor-
mation Retrieval.
Zhang, Y., Yang, M., Xu, B., Yang, Z., Gu, G., Ning, P.,
Wang, X. S., and Zang, B. (2013). Vetting undesirable
behaviors in android apps with permission use analy-
sis. In Proceedings of the 2013 ACM SIGSAC Confer-
ence on Computer & Communications Security,
CCS ’13, pages 611–622, New York, NY, USA. ACM.
Extracting Android Malicious Behaviors
723