scispace - formally typeset
Journal ArticleDOI

A Survey of Android Malware Detection with Deep Neural Models

TLDR
This survey aims to address the challenges in DL-based Android malware detection and classification by systematically reviewing the latest progress, including FCN, CNN, RNN, DBN, AE, and hybrid models, and organize the literature according to the DL architecture.
Abstract
Deep Learning (DL) is a disruptive technology that has changed the landscape of cyber security research. Deep learning models have many advantages over traditional Machine Learning (ML) models, particularly when there is a large amount of data available. Android malware detection or classification qualifies as a big data problem because of the fast booming number of Android malware, the obfuscation of Android malware, and the potential protection of huge values of data assets stored on the Android devices. It seems a natural choice to apply DL on Android malware detection. However, there exist challenges for researchers and practitioners, such as choice of DL architecture, feature extraction and processing, performance evaluation, and even gathering adequate data of high quality. In this survey, we aim to address the challenges by systematically reviewing the latest progress in DL-based Android malware detection and classification. We organize the literature according to the DL architecture, including FCN, CNN, RNN, DBN, AE, and hybrid models. The goal is to reveal the research frontier, with the focus on representing code semantics for Android malware detection. We also discuss the challenges in this emerging field and provide our view of future research opportunities and directions.

read more

Citations
More filters
Journal ArticleDOI

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey

TL;DR: In this paper , a survey of recently proposed DL solutions to cyber attack detection in the CPS context is provided, where a six-step DL driven methodology is provided to summarize and analyze the surveyed literature for applying DL methods to detect cyber attacks against CPS systems.
Journal ArticleDOI

A survey on analysis and detection of Android ransomware

TL;DR: This article provides a comprehensive survey on analysis and detection methods for Android ransomware since its beginning (2015) till date (2020); but also presents observations and suggestions for researchers and practitioners to carry out further research.
Journal ArticleDOI

Detecting Vulnerability on IoT Device Firmware: A Survey

TL;DR: In this paper , the authors present a survey of the security analysis of IoT devices, focusing on the challenges and potential solutions for these challenges. And they discuss the flaws of these solutions and future directions for this research field.
Journal ArticleDOI

Malware Detection Using Deep Learning and Correlation-Based Feature Selection

TL;DR: In this paper , a high-performance malware detection system using deep learning and feature selection methodologies is introduced, where two different malware datasets are used to detect malware and differentiate it from benign activities.
Book ChapterDOI

DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection based on Image Representation of Bytecode.

TL;DR: In this article, a baseline pipeline for image-based malware detection with straightforward steps is developed and assessed, with a first building block by developing and assessing a baseline framework for image based malware detection.
References
More filters
Proceedings Article

Adam: A Method for Stochastic Optimization

TL;DR: This work introduces Adam, an algorithm for first-order gradient-based optimization of stochastic objective functions, based on adaptive estimates of lower-order moments, and provides a regret bound on the convergence rate that is comparable to the best known results under the online convex optimization framework.
Proceedings Article

ImageNet Classification with Deep Convolutional Neural Networks

TL;DR: The state-of-the-art performance of CNNs was achieved by Deep Convolutional Neural Networks (DCNNs) as discussed by the authors, which consists of five convolutional layers, some of which are followed by max-pooling layers, and three fully-connected layers with a final 1000-way softmax.
Proceedings ArticleDOI

ImageNet: A large-scale hierarchical image database

TL;DR: A new database called “ImageNet” is introduced, a large-scale ontology of images built upon the backbone of the WordNet structure, much larger in scale and diversity and much more accurate than the current image datasets.
Proceedings ArticleDOI

Going deeper with convolutions

TL;DR: Inception as mentioned in this paper is a deep convolutional neural network architecture that achieves the new state of the art for classification and detection in the ImageNet Large-Scale Visual Recognition Challenge 2014 (ILSVRC14).
Book

Deep Learning

TL;DR: Deep learning as mentioned in this paper is a form of machine learning that enables computers to learn from experience and understand the world in terms of a hierarchy of concepts, and it is used in many applications such as natural language processing, speech recognition, computer vision, online recommendation systems, bioinformatics, and videogames.
Related Papers (5)
Trending Questions (1)
How Companies Are Using machine learning and deep learning to improve human experience?

Deep learning models have many advantages over traditional Machine Learning (ML) models, particularly when there is a large amount of data available.