Next Article in Journal
Semantic Search Enhanced with Rating Scores
Previous Article in Journal
Cybersecurity and Safety Co-Engineering of Cyberphysical Systems—A Comprehensive Survey
Article

PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting †

1
School of Computing Science and Engineering, VIT University Bhopal, Bhopal 466114, India
2
Department of Information Security and Communication Technology (IIK), Norwegian University of Science and Technology, 2815 Gjøvik, Norway
*
Author to whom correspondence should be addressed.
This paper is an extended work from earlier work “PACE: Platform for Android Malware Classification and Performance Evaluation”.
Future Internet 2020, 12(4), 66; https://doi.org/10.3390/fi12040066
Received: 15 January 2020 / Revised: 27 March 2020 / Accepted: 7 April 2020 / Published: 12 April 2020
Android malware has become the topmost threat for the ubiquitous and useful Android ecosystem. Multiple solutions leveraging big data and machine-learning capabilities to detect Android malware are being constantly developed. Too often, these solutions are either limited to research output or remain isolated and incapable of reaching end users or malware researchers. An earlier work named PACE (Platform for Android Malware Classification and Performance Evaluation), was introduced as a unified solution to offer open and easy implementation access to several machine-learning-based Android malware detection techniques, that makes most of the research reproducible in this domain. The benefits of PACE are offered through three interfaces: Representational State Transfer (REST) Application Programming Interface (API), Web Interface, and Android Debug Bridge (ADB) interface. These multiple interfaces enable users with different expertise such as IT administrators, security practitioners, malware researchers, etc. to use their offered services. In this paper, we propose PACER (Platform for Android Malware Classification, Performance Evaluation, and Threat Reporting), which extends PACE by adding threat intelligence and reporting functionality for the end-user device through the ADB interface. A prototype of the proposed platform is introduced, and our vision is that it will help malware analysts and end users to tackle challenges and reduce the amount of manual work. View Full-Text
Keywords: android malware; machine learning; static and dynamic features; cyber threat intelligence; threat report generation; reproducible research android malware; machine learning; static and dynamic features; cyber threat intelligence; threat report generation; reproducible research
Show Figures

Figure 1

MDPI and ACS Style

Kumar, A.; Agarwal, V.; Kumar Shandilya, S.; Shalaginov, A.; Upadhyay, S.; Yadav, B. PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting. Future Internet 2020, 12, 66. https://doi.org/10.3390/fi12040066

AMA Style

Kumar A, Agarwal V, Kumar Shandilya S, Shalaginov A, Upadhyay S, Yadav B. PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting. Future Internet. 2020; 12(4):66. https://doi.org/10.3390/fi12040066

Chicago/Turabian Style

Kumar, Ajit, Vinti Agarwal, Shishir Kumar Shandilya, Andrii Shalaginov, Saket Upadhyay, and Bhawna Yadav. 2020. "PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting" Future Internet 12, no. 4: 66. https://doi.org/10.3390/fi12040066

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop