Next Article in Journal
Kinetic Theory of a Confined Quasi-Two-Dimensional Gas of Hard Spheres
Next Article in Special Issue
User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks
Previous Article in Journal
Investigation into Multi-Temporal Scale Complexity of Streamflows and Water Levels in the Poyang Lake Basin, China
Previous Article in Special Issue
Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack
Open AccessArticle

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

by Chundong Wang 1,2, Zhiyuan Li 1,2, Liangyi Gong 1,2,*, Xiuliang Mo 1,2, Hong Yang 1,2 and Yi Zhao 1,2
1
Key Laboratory of Computer Vision and System, Ministry of Education, Tianjin University of Technology, 300384 Tianjin, China
2
Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Ministry of Education, Tianjin University of Technology, 300384 Tianjin, China
*
Author to whom correspondence should be addressed.
Academic Editor: James J. Park
Entropy 2017, 19(2), 65; https://doi.org/10.3390/e19020065
Received: 27 October 2016 / Revised: 29 January 2017 / Accepted: 30 January 2017 / Published: 11 February 2017
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static detection method whose feature selected is the semantic of application source code can not completely extract malware’s code features. The Android malware static detection methods whose features used are only obtained from the AndroidManifest.xml file are easily affected by useless permissions. Therefore, there are some limitations in current Android malware static detection methods. The current Android malware dynamic detection algorithm is mostly required to customize the system or needs system root permissions. Based on the Dendritic Cell Algorithm (DCA), this paper proposes an Android malware algorithm that has a higher detection rate, does not need to modify the system, and reduces the impact of code obfuscation to a certain degree. This algorithm is applied to an Android malware detection method based on oriented Dalvik disassembly sequence and application interface (API) calling sequence. Through the designed experiments, the effectiveness of this method is verified for the detection of Android malware. View Full-Text
Keywords: Android malware; Dalvik disassembly sequence; suspicious API; static detection; DCA; danger theory Android malware; Dalvik disassembly sequence; suspicious API; static detection; DCA; danger theory
Show Figures

Figure 1

MDPI and ACS Style

Wang, C.; Li, Z.; Gong, L.; Mo, X.; Yang, H.; Zhao, Y. An Android Malicious Code Detection Method Based on Improved DCA Algorithm. Entropy 2017, 19, 65.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop