Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Duque, J., Mendes, G., Nunes, L., de Almeida, A. & Serrão, C. (2022). Automated android malware detection using user feedback. Sensors. 22 (17)
Exportar Referência (IEEE)
J. G. Duque et al.,  "Automated android malware detection using user feedback", in Sensors, vol. 22, no. 17, 2022
Exportar BibTeX
@article{duque2022_1732211352349,
	author = "Duque, J. and Mendes, G. and Nunes, L. and de Almeida, A. and Serrão, C.",
	title = "Automated android malware detection using user feedback",
	journal = "Sensors",
	year = "2022",
	volume = "22",
	number = "17",
	doi = "10.3390/s22176561",
	url = "https://www.mdpi.com/journal/sensors"
}
Exportar RIS
TY  - JOUR
TI  - Automated android malware detection using user feedback
T2  - Sensors
VL  - 22
IS  - 17
AU  - Duque, J.
AU  - Mendes, G.
AU  - Nunes, L.
AU  - de Almeida, A.
AU  - Serrão, C.
PY  - 2022
SN  - 1424-8220
DO  - 10.3390/s22176561
UR  - https://www.mdpi.com/journal/sensors
AB  - The widespread usage of mobile devices and their seamless adaptation to each user’s needs through useful applications (apps) makes them a prime target for malware developers. Malware is software built to harm the user, e.g., to access sensitive user data, such as banking details, or to hold data hostage and block user access. These apps are distributed in marketplaces that host millions and therefore have their forms of automated malware detection in place to deter malware developers and keep their app store (and reputation) trustworthy. Nevertheless, a non-negligible number of apps can bypass these detectors and remain available in the marketplace for any user to download and install on their device. Current malware detection strategies rely on using static or dynamic app extracted features (or a combination of both) to scale the detection and cover the growing number of apps submitted to the marketplace. In this paper, the main focus is on the apps that bypass the malware detectors and stay in the marketplace long enough to receive user feedback. This paper uses real-world data provided by an app store. The quantitative ratings and potential alert flags assigned to the apps by the users were used as features to train machine learning classifiers that successfully classify malware that evaded previous detection attempts. These results present reasonable accuracy and thus work to help to maintain a user-safe environment.
ER  -