Skip to main content
. 2021 Jun 11;7:e522. doi: 10.7717/peerj-cs.522

Table 11. The detection of malware, which attacks Android OS, based on previous static analysis.

To identify the trends in the detection of malware through static analysis, this section presents a list of previous works of research, which cover all areas (year, features, and classification).

Year Ref Features (•) Classification (✓)
AD API A DP C F G M N CB ML DL Graph Other
2019 Hammad, Bagheri & Malek (2019) Multiple-Domain Matrix (MDM)
2019 Fan et al. (2019)
2019 Badhani & Muttoo (2019)
2019 Wu et al. (2019)
2019 Liu et al. (2019)
2019 Alotaibi (2019)
2019 Zhang, Tian & Duan (2019)
2019 Alsoghyer & Almomani (2019)
2019 Yildiz & Doǧru (2019)
2019 Singh, Jaidhar & Kumara (2019)
2019 Lei et al. (2019)
2018 Firdaus et al. (2018)
2018 Zhao et al. (2019)
2018 Gu et al. (2018)
2018 Firdaus et al. (2017)
2018 Firdaus et al. (2018)
2018 Klieber et al. (2018)
2018 Kumar, Kuppusamy & Aghila (2018)
2018 Wang et al. (2018)
2018 Ma Zhao-hui et al. (2017)
2017 Feizollah et al. (2017)
2017 Kim et al. (2018)
2017 Zhou et al. (2017)
2017 Pooryousef & Amini (2017)
2017 Wu et al. (2018)
2017 Chang & De Wang (2017)
2016 Junaid, Liu & Kung (2016a)
2016 Atici, Sagiroglu & Dogru (2016)
2016 Medvet & Mercaldo (2016)
2016 Wu et al. (2016)
2016 Nissim et al. (2016)
2015 Sheen, Anitha & Natarajan (2015)
2015 Kang et al. (2015)
2015 Kang et al. (2015)
2015 Firdaus & Anuar (2015)
2015 Talha, Alper & Aydin (2015)
2015 Junaid, Liu & Kung (2016a)
2015 Lee, Lee & Lee (2015)
2015 Elish et al. (2015)
2015 Gordon et al. (2015)
2014 Yerima, Sezer & McWilliams (2014)
2014 Arp et al. (2014)
2014 Deshotels, Notani & Lakhotia (2014b)
2014 Feng et al. (2014)
2014 Huang et al. (2014a)
2014 Steven Arzt et al. (2014)
2014 Yerima, Sezer & Muttik (2014)
2014 Seo et al. (2014) MD5 signature
2014 Suarez-Tangil et al. (2014)
2013 Aafer, Du & Yin (2013)
2013 Lee & Jin (2013)
2013 Shuying Liang et al. (2013)
2013 Zhou et al. (2013)
2013 Luoshi et al. (2013)
2013 Peiravian & Zhu (2013)
2013 Samra, Kangbin & Ghanem (2013)
2013 Gascon et al. (2013)
2013 Huang, Tsai & Hsu (2012)
2013 Aung & Zaw (2013)
2013 Faruki et al. (2013) Similarity digest hashing
2013 Paturi et al. (2013) Normalised Compression Distance (NCD)
2013 Apvrille & Apvrille (2013)
2013 Yerima et al. (2013)
2013 Borja Sanz et al. (2013)
2012 Grace et al. (2012a)
2012 Wu et al. (2012)
2012 Bartel et al. (2012)
2012 Grace et al. (2012b)
2012 Zhou et al. (2012) Fuzzy hashing technique
2012 Hao Peng et al. (2012)
2012 Walenstein, Deshotels & Lakhotia (2012)
2012 Sahs & Khan (2012)
2012 Sanz et al. (2013)
2012 Apvrille & Strazzere (2012) Risk score weight
2012 Lu et al. (2012)
2012 Crussell, Gibler & Chen (2012)
2012 Desnos (2012b) Normalised Compression Distance (NCD)
2012 Sarma et al. (2012)
2012 Yang & Yang (2012)
2011 Grace et al. (2011)
2010 Shabtai, Fledel & Elovici (2010)
2009 Aubrey-Derrick Schmidt et al. (2009a)

Notes.

Legends:

AD
Advertisement libraries
API
API
A
apk, dex and XML properties
DP
Directory path
C
Commands
F
unction call
G
Geographic
M
Manifest file
N
Network address or URLs
CB
Code-based