I. Khan, Zahoor Ali Khan, Mir Ahmad, A. Khan, Fida Muahmmad, Azhar Imran, Sheeraz Ahmed, Muhammad Khalid Hamid
{"title":"Machine Learning Techniques for Permission-based Malware Detection in Android Applications","authors":"I. Khan, Zahoor Ali Khan, Mir Ahmad, A. Khan, Fida Muahmmad, Azhar Imran, Sheeraz Ahmed, Muhammad Khalid Hamid","doi":"10.1109/ITT59889.2023.10184260","DOIUrl":null,"url":null,"abstract":"Most smartphones and tablets have either been produced or are about to be released, and the Android operating system is swiftly gaining market share. These days, customers utilize Android applications often for a broad variety of tasks. As a result, attackers now frequently target the Android platform. Many harmful applications have been discovered in Information technology, and they frequently act maliciously in ways that don't correspond to their intended characteristics. Therefore, it's essential to identify harmful Android applications. This article describes multiple techniques for identifying fraudulent programmers using app permissions.","PeriodicalId":223578,"journal":{"name":"2023 9th International Conference on Information Technology Trends (ITT)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 9th International Conference on Information Technology Trends (ITT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITT59889.2023.10184260","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Most smartphones and tablets have either been produced or are about to be released, and the Android operating system is swiftly gaining market share. These days, customers utilize Android applications often for a broad variety of tasks. As a result, attackers now frequently target the Android platform. Many harmful applications have been discovered in Information technology, and they frequently act maliciously in ways that don't correspond to their intended characteristics. Therefore, it's essential to identify harmful Android applications. This article describes multiple techniques for identifying fraudulent programmers using app permissions.