.

Zero-Vuln: Using deep learning and zero-shot learning techniques to detect zero-day Android malware

Show simple item record

dc.contributor.author Sawadogo, Zakaria
dc.contributor.author Dembele, Jean-Marie
dc.contributor.author Mendy, Gervais
dc.contributor.author Ouya, Samuel
dc.date.accessioned 2024-01-03T09:25:39Z
dc.date.available 2024-01-03T09:25:39Z
dc.date.issued 2023-09-22
dc.identifier.uri https://repository.rsif-paset.org/xmlui/handle/123456789/323
dc.description Full-text: https://doi.org/10.1109/ICECCME57830.2023.10252803 en_US
dc.description.abstract The prevalence of cyber security threats, such as the Android Zero-day vulnerability, is becoming increasingly worrisome. With the widespread use of Android-powered mobile devices, attackers are leveraging zero-day vulnerabilities to infect Android software at an alarming rate. Detecting zero-day vulnerabilities in Android applications is particularly challenging due to their unpatched and undiscovered nature, resulting in a lack of reference points for identification. In response to this issue, we propose a novel and effective system called Zero-Vuln, which is designed to classify and identify zero-day Android malware. Zero-Vuln leverages deep learning and zero-shot learning techniques, as well as established data-sets, to identify previously unknown malware. Our approach achieves a remarkable performance of 83% accuracy, as well as high precision and recall, and represents a significant contribution to the field of cyber security. en_US
dc.publisher IEEE Xplore en_US
dc.subject Zero-day malware Android detection , Deep learning , Zero-day vulnerabilities , Zero-shot learning en_US
dc.title Zero-Vuln: Using deep learning and zero-shot learning techniques to detect zero-day Android malware en_US
dc.type Article en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search RSIF Digital Repository


Advanced Search

Browse

My Account