Skip to main content
Contribution to Book
Static and Dynamic Analysis of Android Malware
Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)
  • Ankita Kapratwar, San Jose State University
  • Fabio Di Troia, San Jose State University
  • Mark Stamp, San Jose State University
Abstract
Static analysis relies on features extracted without executing code, while dynamic analysis extracts features based on execution (or emulation). In general, static analysis is more efficient, while dynamic analysis can be more informative, particularly in cases where the code is obfuscated. Static analysis of an Android application can, for example, rely on features extracted from the manifest file or the Java bytecode, while dynamic analysis of such applications might deal with features involving dynamic code loading and system calls. In this research, we apply machine learning techniques to analyze the relative effectiveness of particular static and dynamic features for detecting Android malware. We also carefully analyze the robustness of the scoring techniques under consideration.
Publication Date
February 19, 2017
ISBN
978-989-758-209-7
DOI
10.5220/0006256706530662
Citation Information
Ankita Kapratwar, Fabio Di Troia and Mark Stamp. "Static and Dynamic Analysis of Android Malware" Proceedings of the 3rd International Conference on Information Systems Security and Privacy (2017)
Available at: http://works.bepress.com/mark_stamp/59/