Paper
28 July 2022 Android malware detection method based on new gray image and VGG
Chen Liang, Chao Li, Xin Li, He Liang
Author Affiliations +
Proceedings Volume 12303, International Conference on Cloud Computing, Internet of Things, and Computer Applications (CICA 2022); 1230328 (2022) https://doi.org/10.1117/12.2642589
Event: International Conference on Cloud Computing, Internet of Things, and Computer Applications, 2022, Luoyang, China
Abstract
Android malware is transformed into gray image and recognized by deep learning model, so as to realize end-to-end detection. This method has the natural advantage of resisting code obfuscation attack. At present, most of the methods used by researchers for gray image recognition of Android malware are roughly processed by a single convolutional neural network, which does not make good use of this advantage. Therefore, this paper proposes a new Android malware detection method, which is different from the traditional detection method XML file and class.dex file is purified, combined and mapped into a gray image, and then the VGG neural network model is used to detect the gray image. At the same time, we take out the models such as mobilenet and alexnet for comparison. The experimental results show that the purification method has good Android malware detection effect, and the VGG model training results have higher detection accuracy than the other two algorithms, and all evaluation indexes have good performance.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chen Liang, Chao Li, Xin Li, and He Liang "Android malware detection method based on new gray image and VGG", Proc. SPIE 12303, International Conference on Cloud Computing, Internet of Things, and Computer Applications (CICA 2022), 1230328 (28 July 2022); https://doi.org/10.1117/12.2642589
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Convolution

Binary data

Data modeling

Information security

Image processing

Statistical modeling

Network security

Back to Top