dc.contributor.author |
Sawadogo, Zakaria |
|
dc.contributor.author |
Jean-Marie, Dembele |
|
dc.contributor.author |
Attoumane, Tahar |
|
dc.contributor.author |
Gervais, Mendy |
|
dc.contributor.author |
Ouya, Samuel |
|
dc.date.accessioned |
2023-05-09T08:23:56Z |
|
dc.date.available |
2023-05-09T08:23:56Z |
|
dc.date.issued |
2023-02-21 |
|
dc.identifier.uri |
https://repository.rsif-paset.org/xmlui/handle/123456789/245 |
|
dc.description |
Conference paper and part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 459): https://link.springer.com/bookseries/8197 |
en_US |
dc.description.abstract |
The detection of malware android became very crucial with the use of obfuscation techniques by developers of malicious applications. In the literature several approaches have been proposed to take into account certain techniques. But it is difficult to take into account all obfuscation techniques because of mutations and this is a critical challenge for cybersecurity. In this contribution, we proposed an approach to detect obfuscated malicious applications. This approach is based on the memory dump process. This process helps to discover the behaviour of obfuscated applications while they are executing without targeting a particular obfuscation technique. We implemented our application using supervised neural networks. We tested and selected hyper-parameters to train our detection model. The different results obtained by the evaluation metrics such as accuracy, precision, recall and F1 score, are excellent with high values around 99%. |
en_US |
dc.publisher |
Springer |
en_US |
dc.subject |
Android malware detection, Obfuscation techniques, Deep learning, Cybersecurity, Machine learning, Memory dump |
en_US |
dc.title |
DeepMalOb: Deep Detection of Obfuscated Android Malware |
en_US |
dc.type |
Other |
en_US |