{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T02:45:34Z","timestamp":1747190734975,"version":"3.40.5"},"reference-count":36,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T00:00:00Z","timestamp":1629331200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,8,19]]},"abstract":"<jats:p>The malicious APK (Android Application Package) makers use some techniques such as code obfuscation and code encryption to avoid existing detection methods, which poses new challenges for accurate virus detection and makes it more and more difficult to detect the malicious code. A report indicates that a new malicious app for Android is created every 10 seconds. To combat this serious malware activity, a scalable malware detection approach is needed, which can effectively and efficiently identify the malware apps. Common static detection methods often rely on Hash matching and analysis of viruses, which cannot quickly detect new malicious Android applications and their variants. In this paper, a malicious Android application detection method is proposed, which is implemented by the deep network fusion model. The hybrid model only needs to use the sample training model to achieve high accuracy in the identification of the malicious applications, which is more suitable for the detection of the new malicious Android applications than the existing methods. This method extracts the static features in the core code of the Android application by decompiling APK files, then performs code vectorization processing, and uses the deep learning network for classification and discrimination. Our experiments with a data set containing 10,170 apps show that the decisions from the hybrid model can increase the malware detection rate significantly on a real device, which verifies the superiority of this method in the detection of malicious codes.<\/jats:p>","DOI":"10.1155\/2021\/9964224","type":"journal-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T22:35:20Z","timestamp":1629412520000},"page":"1-11","source":"Crossref","is-referenced-by-count":1,"title":["Learning-Based Detection for Malicious Android Application Using Code Vectorization"],"prefix":"10.1155","volume":"2021","author":[{"given":"Lin","family":"Liu","sequence":"first","affiliation":[{"name":"China Information Technology Security Evaluation Center, Beijing, China"},{"name":"College of Electronics, Sichuan University, Chengdu, China"}]},{"given":"Wang","family":"Ren","sequence":"additional","affiliation":[{"name":"China Information Technology Security Evaluation Center, Beijing, China"},{"name":"College of Electronics, Sichuan University, Chengdu, China"}]},{"given":"Feng","family":"Xie","sequence":"additional","affiliation":[{"name":"China Information Technology Security Evaluation Center, Beijing, China"}]},{"given":"Shengwei","family":"Yi","sequence":"additional","affiliation":[{"name":"China Information Technology Security Evaluation Center, Beijing, China"}]},{"given":"Junkai","family":"Yi","sequence":"additional","affiliation":[{"name":"Beijing Information Science and Technology University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0455-8779","authenticated-orcid":true,"given":"Peng","family":"Jia","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu, China"}]}],"member":"311","reference":[{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/3176258.3176942"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1080\/19361610.2018.1387734"},{"author":"G. Canfora","first-page":"333","article-title":"Effectiveness of opcode N-grams for detection of multifamily android malware","key":"3"},{"author":"B. Wang","first-page":"707","article-title":"Neural cleanse: identifying and mitigating backdoor attacks in neural networks","key":"4"},{"issue":"1","key":"5","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/TDSC.2016.2536605","article-title":"MADAM: effective and efficient behavior-based android malware detection and prevention","volume":"15","author":"A. Saracino","year":"2016","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/tse.2016.2630689"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1631\/FITEE.1601491"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/tifs.2018.2866319"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1007\/s10586-017-0944-y"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/3287921.3287977"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1007\/s12652-018-0803-6"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/2810103.2813642"},{"author":"G. Canfora","first-page":"13","article-title":"Detecting android malware using sequences of system calls","key":"13"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1007\/s11042-017-5104-0"},{"author":"S. Hou","first-page":"104","article-title":"Deep4MalDroid:a deep learning framework for android malware detecti detection based on linux kernel system call graphs","key":"15"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1049\/iet-ifs.2015.0211"},{"author":"A. Abderrahmane","first-page":"1","article-title":"Android malware detection based on system calls analysis and CNN classification","key":"17"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1155\/2015\/479174"},{"doi-asserted-by":"publisher","key":"19","DOI":"10.1007\/978-981-10-8536-9_23"},{"author":"X. Li","first-page":"239","article-title":"An android malware detection method based on android manifest file","key":"20"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/tst.2016.7399288"},{"author":"S. Sabhadiya","first-page":"1254","article-title":"Android malware detection using deep learning","key":"22"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1007\/978-3-319-47121-1_5"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00047"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1007\/s10207-014-0250-0"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1109\/tifs.2018.2879302"},{"doi-asserted-by":"publisher","key":"27","DOI":"10.1016\/j.cose.2019.02.007"},{"issue":"4","key":"28","first-page":"39","article-title":"A C-LSTM neural network for text classification","volume":"1","author":"C. Zhou","year":"2015","journal-title":"Computer Science"},{"author":"R. Pascanu","first-page":"1916","article-title":"Malware classification with recurrent networks","key":"29"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1007\/978-3-319-50127-7_11"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1109\/TIFS.2015.2510825"},{"issue":"2","key":"32","first-page":"29","article-title":"Bi-directional long short-term memory neural networks for Chinese word segmentation","volume":"32","author":"J. Chen","year":"2018","journal-title":"Journal of Chinese Information Processing"},{"issue":"5","key":"33","first-page":"1130","article-title":"A fast random-valued impulse noise detection algorithm based on deep belief network","volume":"41","author":"X. U. Shaoping","year":"2019","journal-title":"Journal of Electronics and Information Technology"},{"doi-asserted-by":"publisher","key":"34","DOI":"10.1109\/CVPR.2018.00429"},{"doi-asserted-by":"publisher","key":"35","DOI":"10.1145\/3029806.3029823"},{"issue":"9","key":"36","first-page":"2209","article-title":"Android malware detection based on CNN and LSTM","volume":"51","author":"C. Wang","year":"2018","journal-title":"Communications Technology"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9964224.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9964224.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/9964224.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T22:35:27Z","timestamp":1629412527000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/9964224\/"}},"subtitle":[],"editor":[{"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,8,19]]},"references-count":36,"alternative-id":["9964224","9964224"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9964224","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,8,19]]}}}