Intelligent mobile malware detection

Tony Thomas, Roopak Surendran, Teenu S. John, Mamoun Alazab

    Research output: Book/ReportBookpeer-review


    The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, the text shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples, and the malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware.

    Original languageEnglish
    Place of PublicationBoca Raton
    PublisherCRC Press
    Number of pages174
    ISBN (Electronic)9781000824971
    ISBN (Print)9780367638719
    Publication statusPublished - 30 Dec 2022


    Dive into the research topics of 'Intelligent mobile malware detection'. Together they form a unique fingerprint.

    Cite this