Please use this identifier to cite or link to this item: https://repository.rsif-paset.org/xmlui/handle/123456789/245
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSawadogo, Zakaria-
dc.contributor.authorJean-Marie, Dembele-
dc.contributor.authorAttoumane, Tahar-
dc.contributor.authorGervais, Mendy-
dc.contributor.authorOuya, Samuel-
dc.date.accessioned2023-05-09T08:23:56Z-
dc.date.available2023-05-09T08:23:56Z-
dc.date.issued2023-02-21-
dc.identifier.urihttps://repository.rsif-paset.org/xmlui/handle/123456789/245-
dc.descriptionConference paper and part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 459): https://link.springer.com/bookseries/8197en_US
dc.description.abstractThe detection of malware android became very crucial with the use of obfuscation techniques by developers of malicious applications. In the literature several approaches have been proposed to take into account certain techniques. But it is difficult to take into account all obfuscation techniques because of mutations and this is a critical challenge for cybersecurity. In this contribution, we proposed an approach to detect obfuscated malicious applications. This approach is based on the memory dump process. This process helps to discover the behaviour of obfuscated applications while they are executing without targeting a particular obfuscation technique. We implemented our application using supervised neural networks. We tested and selected hyper-parameters to train our detection model. The different results obtained by the evaluation metrics such as accuracy, precision, recall and F1 score, are excellent with high values around 99%.en_US
dc.publisherSpringeren_US
dc.subjectAndroid malware detection, Obfuscation techniques, Deep learning, Cybersecurity, Machine learning, Memory dumpen_US
dc.titleDeepMalOb: Deep Detection of Obfuscated Android Malwareen_US
dc.typeOtheren_US
Appears in Collections:ICTs including Big Data and Artificial Intelligence

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.