Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application

Android has become the number one mobile operating system in term of worldwide market share since May 2012. The highest demand and the open source factors had brought Android operating system into main target of malware creator. Two approaches introduced to detect malware in Android mobile environme...

Full description

Saved in:
Bibliographic Details
Main Author: Aminordin, Azmi
Format: Thesis
Language:English
English
Published: 2021
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/25387/1/Enhancement%20Of%20Static%20Code%20Analysis%20Malware%20Detection%20Framework%20For%20Android%20Category-Based%20Application.pdf
http://eprints.utem.edu.my/id/eprint/25387/2/Enhancement%20Of%20Static%20Code%20Analysis%20Malware%20Detection%20Framework%20For%20Android%20Category-Based%20Application.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.25387
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Abdollah, Mohd Faizal

topic T Technology (General)
T Technology (General)
spellingShingle T Technology (General)
T Technology (General)
Aminordin, Azmi
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
description Android has become the number one mobile operating system in term of worldwide market share since May 2012. The highest demand and the open source factors had brought Android operating system into main target of malware creator. Two approaches introduced to detect malware in Android mobile environment namely static analysis and dynamic analysis. Static analysis is where the static features are examined. Too many features used, features extraction time consuming and the reliability of accuracy result by various machine learning algorithm are the main issues spotted in static analysis approach. As such, this thesis investigates the whole Android static analysis framework in detecting and classifying mobile malware. The early study found that two static features that are often used (permission and API calls) with the right mapping are sufficient to analyse the Android malware. The new permission(s) toward API call(s) mapping for Android level 16 to 24 is constructed based on Android official developer guideline references where previously these two features are mapped without using the standard guideline. On experimenting and analysing the framework, there are 4767 benign applications from 10 different categories was collected from Android official market place and 3443 malware applications was collected from AndroZoo dataset. All benign files are then scanned through VirusTotal to ensure that all collected files are free from virus. On extracting the desired features, a new automation of feature extraction using Depth First Search (DFS) with sequential search are introduced and succeed to extract the targeted features with consideration of no limitation on application file size also no limitation on file number. In order to enables machine learning to train faster and reduces the complexity of a machine learning model, the information gain features selection is applied towards the extracted features. Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. The validation results show that Random Forest with 10-folds cross validation spitting dataset achieved 8 highest performance compared to benchmark study and two other classifiers. This study suggests the work to combine the optimization of feature selection and algorithm parameters to achieve higher accuracy and acquire more reliable comparison.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Aminordin, Azmi
author_facet Aminordin, Azmi
author_sort Aminordin, Azmi
title Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
title_short Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
title_full Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
title_fullStr Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
title_full_unstemmed Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
title_sort enhancement of static code analysis malware detection framework for android category-based application
granting_institution Universiti Teknikal Malaysia Melaka
granting_department Faculty of Information and Communication Technology
publishDate 2021
url http://eprints.utem.edu.my/id/eprint/25387/1/Enhancement%20Of%20Static%20Code%20Analysis%20Malware%20Detection%20Framework%20For%20Android%20Category-Based%20Application.pdf
http://eprints.utem.edu.my/id/eprint/25387/2/Enhancement%20Of%20Static%20Code%20Analysis%20Malware%20Detection%20Framework%20For%20Android%20Category-Based%20Application.pdf
_version_ 1747834115304980480
spelling my-utem-ep.253872021-11-17T08:46:04Z Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application 2021 Aminordin, Azmi T Technology (General) TK Electrical engineering. Electronics Nuclear engineering Android has become the number one mobile operating system in term of worldwide market share since May 2012. The highest demand and the open source factors had brought Android operating system into main target of malware creator. Two approaches introduced to detect malware in Android mobile environment namely static analysis and dynamic analysis. Static analysis is where the static features are examined. Too many features used, features extraction time consuming and the reliability of accuracy result by various machine learning algorithm are the main issues spotted in static analysis approach. As such, this thesis investigates the whole Android static analysis framework in detecting and classifying mobile malware. The early study found that two static features that are often used (permission and API calls) with the right mapping are sufficient to analyse the Android malware. The new permission(s) toward API call(s) mapping for Android level 16 to 24 is constructed based on Android official developer guideline references where previously these two features are mapped without using the standard guideline. On experimenting and analysing the framework, there are 4767 benign applications from 10 different categories was collected from Android official market place and 3443 malware applications was collected from AndroZoo dataset. All benign files are then scanned through VirusTotal to ensure that all collected files are free from virus. On extracting the desired features, a new automation of feature extraction using Depth First Search (DFS) with sequential search are introduced and succeed to extract the targeted features with consideration of no limitation on application file size also no limitation on file number. In order to enables machine learning to train faster and reduces the complexity of a machine learning model, the information gain features selection is applied towards the extracted features. Four types of machine learning algorithm were tested with four different kind of splitting dataset techniques separately. The result shows that the detection of malware within application category achieves higher accuracy compared to application with non-category based. In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. The validation results show that Random Forest with 10-folds cross validation spitting dataset achieved 8 highest performance compared to benchmark study and two other classifiers. This study suggests the work to combine the optimization of feature selection and algorithm parameters to achieve higher accuracy and acquire more reliable comparison. 2021 Thesis http://eprints.utem.edu.my/id/eprint/25387/ http://eprints.utem.edu.my/id/eprint/25387/1/Enhancement%20Of%20Static%20Code%20Analysis%20Malware%20Detection%20Framework%20For%20Android%20Category-Based%20Application.pdf text en validuser http://eprints.utem.edu.my/id/eprint/25387/2/Enhancement%20Of%20Static%20Code%20Analysis%20Malware%20Detection%20Framework%20For%20Android%20Category-Based%20Application.pdf text en public https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=119743 dphil doctoral Universiti Teknikal Malaysia Melaka Faculty of Information and Communication Technology Abdollah, Mohd Faizal 1. Abdullah, Z. and Saudi, M.M., 2018. RAPID-Risk Assessment of Android Permission and Application Programming Interface (API) Call for Android Botnet. International Journal of Emerging Technologies in Learning (iJET), 13 (10), pp. 49–54. 2. Abela, K., Angeles, D. and Alas, J., 2013. An Automated Malware Detection System for Android using Behavior-based Analysis AMDA. International Journal of Cyber-Security and Digital Forensics, 2 (2), pp. 1–11. 3. Alam, M.S. and Vuong, S.T., 2013. Random forest classification for detecting android malware. Proceedings - 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013, Beijing, China, 20-23 August 2013,IEEE Computer Society. 4. Alatwi, H.A. 2016, Android Malware Detection Using Category-Based Machine Learning Classifiers. Rochester Institute of Technology. 5. Alatwi, H.A., Oh, T. and Fokoue, E., 2016. Android Malware Detection Using Category- Based Machine Learning Classifiers. Proceedings of the 17th Annual Conference on Information Technology Education, Massachusetts, USA, September 2016, ACM. 6. Alimardani, H. and Nazeh, M., 2019. Permission-based Analysis of Android Applications Using Categorization and Deep Learning. MATEC Web of Conferences. Sabah, Malaysia,3- 5 December 2018, EDP Sciences. 7. Allix, K., Bissyandé, T.F., Klein, J. and Traon, Y. Le, 2016. AndroZoo++: Collecting Millions of Android Apps and Their Metadata for the Research Community. Proceedings of the 13th International Conference on Mining Software Repositories, Austin, Texas, 14-15 May 2016, ACM. 8. Almaguer-Angeles, F., Murphy, J., Murphy, L. and Portillo-Dominguez, A.O., 2019. Choosing machine learning algorithms for anomaly detection in smart building iot scenarios.IEEE 5th World Forum on Internet of Things, WF-IoT 2019 - Conference Proceedings,Limerick, Ireland, 15-18 April 2019, IEEE. 9. Altaher, A. and Mohammed, O., 2017. Intelligent Hybrid Approach for Android Malware Detection based on Permissions and API Calls. International Journal of Advanced Computer Science and Applications, 8 (6), pp. 60–7. 10. Amiri, I.S., Akanbi, O.A. and Fazeldehkordi, E., 2015. A Machine-Learning Approach to Phishing Detection and Defense, 1st edn, Syngress, USA. 11. Amos, B., Turner, H. and White, J., 2013. Applying machine learning classifiers to dynamic android malware detection at scale, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013, Sardinia, Italy, 1-5 July 2013, IEEE Xplore. 12. Anderson, B., Quist, D., Neil, J., Storlie, C. and Lane, T., 2011. Graph-based malware detection using dynamic analysis, Journal in Computer Virology, 7 (4), pp. 247–58. App-brain 2017. Most popular Google Play categories. [online] Available at: https://www.appbrain.com/stats/android-market-app-categories [Accessed on 15 Febuary 2018], 13. Apvrille, A. and Strazzere, T., 2012. Reducing the window of opportunity for Android malware Gotta catch ’em all’, Journal in Computer Virology, 8, pp. 61–71. 14. Apvrille, L. and Apvrille, A., 2015. Identifying Unknown Android Malware with Feature Extractions and Classification Techniques, Trustcom/BigDataSE/ISPA, 2015 IEEE, Helsinki,Finland, 20-22 August 2015, IEEE. 15. Armstrong, R.A., 2014. When to use the Bonferroni correction. Journal of the College of Optometrists, 34 (5), pp. 502-508. 16. Arora, N., Bhasin, G. and Sharma, N., 2014. Two way Linear Search Algorithm. International Journal of Computer Applications, 107(21), pp. 6-8. 17. Arp, D., Spreitzenbarth, M., Malte, H., Gascon, H. and Rieck, K., 2014. Drebin: Effective and Explainable Detection of Android Malware in Your Pocket, Symposium on Network and Distributed System Security (NDSS), pp. 23–6. 18. Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Traon, Y. Le, Octeau, D., Mcdaniel, P., Le Traon, Y., Octeau, D. and Mcdaniel, P., 2014. Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Notices, 49 (6), pp. 259–69. 19. Aung, Z. and Zaw, W., 2013. Permission-Based Android Malware Detection. International Journal of Scientific and Technology Research, 2 (3), pp. 228–34. 20. Aurthur L. Samuel, 1967. Some Studies in Machine Learning Using the Games of Checkers.11-Recent Progress, IBM Journal of Research and Development, 11 (6), pp. 601–17. 21. Axelsson, S., 2000. Intrusion Detection Systems : A Survey and Taxonomy. Computer Engineering, pp. 1–27. 22. B, Y.L., Jang, J., Hu, X. and Ou, X., 2017. Android Malware Clustering Through Malicious Payload Mining. 20th International Symposium on Research in Attacks, Intrusions, and Defenses, Atlanta, Georgia, 18-20 September 2017, Springer. 23. Backes, M., Bugiel, S., Derr, E., McDaniel, P., Octeau, D. and Weisgerber, S., 2016. On Demystifying the Android Application Framework : Re-Visiting Android Permission Specification Analysis. 25th USENIX Security Symposium, Austin, Texas, 16-18 August 2017, USENIX Association. 24. Bakour, K., Ünver, H.M. and Ghanem, R., 2018. Android Malware Static Analysis : Techniques, Limitation, and Open Challenges. In: E. Adalı (ed.),3rd International Conference on Computer Science and Engineering UBMK’18, Sarajevo, Bosnia Herzegovina, 20-23 September 2018, IEEE. 25. Ban Mohammed, K., Monemi, A., Joseph, S.B., Ismahani, I., Sulaiman, M.N. and Muhammad Nadzir, M., 2015. Feature Selection and Machine Learning Classification for Malware Detection. Jurnal Teknologi, pp. 243–50. 26. Barrera, D., Oorschot, P.C. Van and Somayaji, A., 2010. A Methodology for Empirical Analysis of Permission-Based Security Models and its Application to Android Categories and Subject Descriptors. ACM Conference on Computer and Communications Security, , Chicago, USA, 4–8 October 2010, ACM Press. 27. Berg, P.E., Franke, K. and Nguyen, H.T., 2012. Generic feature selection measure for botnet malware detection. International Conference on Intelligent Systems Design and Applications ISDA, Kochi, India, 27-29 November 2012, IEEE. 28. Bergmeir, C., Hyndman, R.J. and Koo, B., 2018. A note on the validity of cross-validation for evaluating autoregressive time series prediction. Computational Statistics and Data Analysis, vol. 120, pp. 70–83. 29. Bezobrazov, S., Sachenko, A., Komar, M. and Rubanau, V., 2015. Artificial Immune System for Android OS. The 8th International Conference on Intelligent Data Acquisition and Advanced COmputing Systems: Technology and Application, Warsaw, Poland, 24-26 September 2015, IEEE. 30. Boehm, B. 1981. Software Engineering Economics, R.T. Yeh (ed.), 1st edn, Prentice Hall, New Jersy. 31. Bolón-Canedo, V., Sánchez-Maroño, N. and Alonso-Betanzos, A., 2013. A review of feature selection methods on synthetic data. Knowledge and Information Systems, 34 (3), pp. 483–519. 32. Boudreau, M.C. and Robey, D., 2005. Enacting integrated information technology: A human agency perspective. Organization Science, 16 (1), pp. 3–18. 33. Bravo, P. and Garcia, D.F., 2011. Proactive Detection of Kernel-Mode Rootkits. 2011 Sixth International Conference on Availability, Reliability and Security, Vienna, Austria, 22-26 August 2011, IEEE Computer Society. 34. Brdiczka, O., Liu, J., Price, B., Shen, J., Patil, A., Chow, R., Bart, E. and Ducheneaut, N.,2012. Proactive insider threat detection through graph learning and psychological context. Proceedings - IEEE CS Security and Privacy Workshops, SPW 2012, San Francisco, USA,22-24 May 2012, IEEE Xplore. 35. Breiman, L., 2001. Random forests. Machine Learning, 45 (1), pp. 5–32. 36. Burguera, I., Zurutuza, U. and Nadjm-Tehrani, S., 2011. Crowdroid: Behavior-Based Malware Detection System for Android. Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM ’11, New York, United States, 11 October 2011, ACM. 37. Cabrera, J.B.D., Lewis, L., Prasanth, R.K., Ravichandran, B. and Mehra, R.K., 2001.Proactive detection of distributed denial of service attacks using MIB traffic variables-a feasibility study. 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470), Seattle, USA, 14-18 Mei 2001, IEEE Xplore. 38. Castellanos, A., Castillo, A., Lukyanenko, R. and Tremblay, M.C., 2017. Understandingbenefits and limitations of unstructured data collection for repurposing organizational data. Lecture Notes in Business Information Processing, 300, pp. 13–24. 39. Chan, P.P.K. and Song, W.K., 2014. Static detection of Android malware by usingpermissions and API calls. Proceedings - International Conference on Machine Learning and Cybernetics, Lanzhou, China, 13-16 July 2014, IEEE. 40. Chandramohan, M. and Tan, H.B.K., 2012. Detection of mobile malware in the wild. Computer, 45 (September), pp. 65–71. 41. Chandrashekar, G. and Sahin, F., 2014. A survey on feature selection methods. Computers and Electrical Engineering, 40 (1), pp. 16–28. 42. Chaudhuri, A., 2009. Language-based security on Android. ACM SIGPLAN Notices, 44 (8), p. 4. 43. Chebyshev, V., 2020, Mobile malware evolution 2019, Kaspersky Chebyshev, V., Sinitsyn, F., Parinov, D., Kupreev, O., Lopatin, E. and Kulaev, A., 2020. IT threat evolution Q1 2020. Statistics. [online] Available at:, https://securelist.com/it-threatevolution-q1-2020-statistics/96959/ [Accessed on 08 August 2020]. 44. Chen, T., and Peikari, C., 2008. Malicious software in mobile devices. Handbook of Research on Wireless Security, IGI Global, USA, Information Science Reference. 45. Chen, X., and Zhu, S., 2015. DroidJust: Automated Functionality-Aware Privacy Leakage Analysis for Android Applications. WiSec'15: 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, New York, USA, 25 June 2015, ACM. 46. Chin, E., Felt, A.P., Greenwood, K. and Wagner, D., 2011. Analyzing inter-application communication in Android. Proceedings of the 9th international conference on Mobile systems, applications, and services (2011), Bethesda Maryland, USA, 28 June - 1 July 2011, ACM. 47. Chin, E., Felt, A.P., Sekar, V. and Wagner, D., 2012. Measuring user confidence in smartphone security and privacy. Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS ’12, Washington D.C., USA, 11-13 July 2012, ACM. 48. Choi, S., Bijou, M., Sun, K. and Jung, E., 2015. API Tracing Tool for Android-Based Mobile Devices. International Journal of Information and Education Technology, 5 (6), pp. 460–465. 49. Chorghe, S.P. and Shekokar, N., 2015. An Innovative Technique to Detect Malicious Applications in Android. International Journal of Science and Research (IJSR), 4 (12), pp. 1846 - 1849. 50. Cohen, F. 1986. Computer viruses. Univeristy of Southern California. 51. Cortes, C. and Vapnik, V., 1995. Support-Vector Networks. Machine Learning, 297, pp.273–97. 52. Crossman, A., 2020. Understanding Purposive Sampling - An Overview of the Method and Its Applications. [online] Available at: https://www.thoughtco.com/purposive-sampling-3026727 [Accessed on 30 July 2020]. 53. Cruz-Cunha, M.M., 2014. Chapter 4: Development and Mitigation of Android Malware. 54. Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance,[e-book] Pennsylvania, USA, IGI Global. Available through: < https://sci-hub.do/https://www.igi-global.com/gateway/chapter/115748#pnlRecommendationForm> [Accessed on 27 June 2017]. 55. Damodaran, A., Di, F., Visaggio, T., Corrado, A., Austin, T.H. and Stamp, M., 2015. A Comparison of Static , Dynamic , and Hybrid Analysis for Malware Detection. Journal ofComputer Virology and Hacking Techniques, 13, pp. 1–12. 56. Debar, H., Dacier, M. and Wespi, A., 1999. Towards a taxonomy of intrusion-detection systems. Computer Networks, 31, pp. 805–22. 57. Debar, H., Dacier, M. and Wespi, A., 2000. A Revised Taxonomy for Intrudion-Detecion Systems. Annals of telecommunications. 55(7), pp. 361-378 58. Deepa, K., Radhamani, G. and Vinod, P., 2014. Investigation of feature selection methods for android malware analysis. Procedia Computer Science, 46, pp. 841–8. 59. Deshotels, L., Notani, V. and Lakhotia, A., 2014. DroidLegacy: Automated Familial Classification of Android Malware. Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014 (PPREW’14), New Orleans, USA, 9 December 2014, ACM. 60. Desnos, A. and Gueguen, G., 2011. Android: From reversing to decompilation. Proceeding of Black Hat, Abu Dhabi, UAE, 12-13 December 2011, Black Hat. 61. Devaraj, S. and Paulraj, S., 2015. An Efficient Feature Subset Selection Algorithm for Classification of Multidimensional Dataset. The Scientific World Journal, 2015, pp. 1-9 62. Developer, A., 2009. Permissions on Android. [online] Available at:https://developer.android.com/guide/topics/permissions/overview [Accessed on 12 May 2016]. 63. Developer, A., 2010a. Android Package Index. [online] Available at:https://developer.android.com/reference/packages.html. [Accessed on 14 May 2016]. 64. Developer, A., 2010b. Platform Architecture. [online] Available at:https://developer.android.com/guide/platform [Accessed on 27 August 2017]. 65. Developer, A., 2011. Application Fundamentals. [online] Available at:https://developer.android.com/guide/components/fundamentals [Accessed on 17 August 2016]. 66. Developer, A., 2015. Requesting Permissions at Run Time. [online] Available at:https://developer.android.com/training/permissions/requesting.html [Accessed on 6 January 2016]. 67. Developer, A., 2017. Request App Permissions. [online] Available at:,https://developer.android.com/training/permissions/requesting [Accessed on 12 November 2017]. 68. Domingos, P., 2012. A few useful things to know about machine learning. Communications of the ACM, 55 (10), pp. 78–87. 69. Dua, L. and Bansal, D., 2014. Taxonomy : Mobile Malware Threats and DetectionTechniques. The Fifth International Conference on Internet Engineering and Web services, Delhi , India, 24-25 May 2014, ResearchBib. 70. Eder, T., Rodler, M., Vymazal, D. and Zeilinger, M., 2013. ANANAS - A framework for analyzing Android Applications. Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, 2-6 September 2013, ACM. 71. Elvers, G.C., 2005a. Using SPSS for one way analysis of variance.[online] Available at:http://academic.udayton.edu/gregelvers/psy216/spss/1wayanova.htm [Accessed on 28 April 2018. 72. Elvers, G.C., 2005b. Using SPSS for t-Tests. [online] Available at:, <https://academic.udayton.edu/gregelvers/psy216/spss/ttests.htm [Accessed on 28 April 2018]. 73. Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P. and Sheth, A.N., 2010.TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Vancouver, Canada, 4-6 October 2010, USENIX Association. 74. Enck, W., Octeau, D., McDaniel, P. and Chaudhuri, S., 2011. A Study of Android Application Security. USENIX security, 39(August), pp. 21–21. 75. Enck, W., Ongtang, M. and McDaniel, P., 2009a. On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security - CCS ’09, Chicago, USA, 9-13 November 2009 ACM. 76. Enck, W., Ongtang, M. and McDaniel, P., 2009b. Understanding Android Security. IEEE Security & Privacy Magazine, 7 (1), pp. 50–7. 77. Fan, C.-I., Hsiao, H.-W., Chou, C.-H. and Tseng, Y.F., 2015. Permission based malware protection model for Android application. 2015 IEEE 39th Annual Computer Software and Applications Conference, Taichung, Taiwan, 1-5 July 2012, IEEE. 78. Fan, Y., Ye, Y. and Chen, L., 2016. Malicious sequential pattern mining for automatic malware detection. Expert Systems with Applications, 52, pp. 16–25. 79. Fang, Z., Han, W. and Li, Y., 2014. Permission based Android security: Issues and countermeasures. Computers and Security, 43, pp. 205–18. 80. Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M.S., Conti, M. and Rajarajan, M.,2015. Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys & Tutorials, 17 (2), pp. 998–1022. 81. Feizollah, A., Anuar, N.B., Salleh, R. and Wahab, A.W.A., 2015. A review on feature selection in mobile malware detection. Digital Investigation, 13, pp. 22–37. 82. Feldman, S., Stadther, D. and Wang, B., 2014. Manilyzer: Automated Android malware detection through manifest analysis. 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Philadelphia, USA, 28 - 30 October 2014, IEEE. 83. Felt, A.P., Chin, E., Hanna, S., Song, D. and Wagner, D., 2011. Android permissions demystified. Proceedings of the 18th ACM conference on Computer and communications security - CCS ’11, Chicago, Illnois, USA, 17-21 October 2011, ACM. 84. Felt, A.P., Finifter, M., Chin, E., Hanna, S. and Wagner, D., 2011, A survey of mobile malware in the wild. Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM ’11, Chicago, Illnois, USA, 17-21 October 2011, ACM. 85. Feng, P. Bin, MA, J.F., Sun, C., Xu, X.P. and M, Y., 2018. A Novel Dynamic Android Malware Detection System With Ensemble Learning. IEEE Access, 6, pp. 30996-31011 86. Firdausi, I., Lim, C., Erwin, A. and Nugroho, A.S., 2010. Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection. Second International Conference on Advances in Computing, Control and Telecommunication Technologies (ACT), Jakarta, Indonesia, 2 -3 December 2010, IEEE Computer Society. 87. Fisher, J.B., 1987. Institute of Mathematical Statistics is collaborating with JSTOR to digitize, preserve, and extend access to Statistical Science. Statistical Science, 2 (1), pp. 45–52. 88. Flynn, D., 2010. Student Guide to SPSS, Barnard College, New York, NY, USA. 89. Foley, S.N. and Dumigan, R., 2001. Are Handheld Viruses a Significant Threat?. Communicartion of the ACM, 44, (1), pp. 105–7. 90. Freitag, D., 2000. Machine learning for information extraction in informal domains. Machine learning, 39(2–3), pp. 169–202. 91. Glodek, W. and Harang, R., 2013. Rapid permissions-based detection and analysis of mobile malware using random decision forests. Proceedings - IEEE Military Communications Conference MILCOM, San Diego, USA, 18 - 20 November 2013, IEEE Xplore. 92. Gordon, M.I., Kim, D., Perkins, J., Gilham, L., Nguyen, N. and Rinard, M., 2015. Information-Flow Analysis of Android Applications in DroidSafe. 2015 Network and Distributed System Security (NDSS) Symposium, San Diego, California, USA, 8 - 11 February 2015, Internet Society. 93. Gorla, A., Tavecchia, I., Gross, F. and Zeller, A., 2014. Checking app behavior against app descriptions. Proceedings of the 36th International Conference on Software Engineering - ICSE 2014, Hyderabad, India, 31 May - 7 June 2014, ACM. 94. Grace, M., Zhou, Y., Zhang, Q., Zou, S. and Jiang, X., 2011. RiskRanker : Scalable and Accurate Zero-day Android Malware Detection Categories and Subject Descriptors. Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, Low Wood Bay Lake District, United Kingdom, June 2011, ACM. 95. Grampurohit, V. and Kumar, V., 2014. Category Based Malware Detection for Android. In:J.L. Mauri, S.M. Thampi, D.B. Rawat and D. Jin (eds), Security in Computing and Communications, Delhi, India, 24-27 September 2014, Springer Berlin Heidelberg. 96. Grimes, R.A., 2012. IT’s 9 Biggest Security Threats. [online] Available at: http//www.infoworld.com/article/2614957/security/it-s-9-biggest-security-threats.html [Accessed on 23 April 2017]. 97. Guo, C., Zhang, J., Yan, J., Zhang, Z. and Zhang, Y., 2013. Characterizing and detecting resource leaks in Android applications. 28th International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, 11 -15 November 2013, IEEE. 98. Guyon, I. and Elisseeff, A., 2003. An Introduction to Variable and Feature Selection. The Journal of Machine Learning Research, 3, pp. 1157–1182. 99. H.Reif, J., 1985. DFS is Inherently Sequential. Information Processing Letters, 20 (5) pp.229–234. 100. Hall, M.A., 1999. Correlation-based Feature Selection for Machine Learning. [Thesis] The University of Waikato. 101. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P. and Witten, I.H., 2009. The WEKA Data Mining Software. [online] Available at: <http://www.cs.waikato.ac.nz/ml/weka/ [Accessed on 18 June 2016]. 102. Hall, M.A. and Smith, L.A., 1999. Practical Feature Subset Selection for Machine Learning.In: A.N. Kumar and I. Russell (eds),Twelfth International Florida Artificial Intelligence Research Society Conference, Orlando, Florida, 1 May 1999, AAAI Press. 103. Hecht, G., Benomar, O., Rouvoy, R., Moha, N. and Duchien, L., 2015. Tracking the Software Quality of Android Applications along their Evolution. 2015 30th IEEE/ACM International Conference on Automated Software Engineering, Lincoln, USA, 9 – 13 November 2015, IEEE Computer Society. 104. Hole, G. 2011. The Kruskal-Wallis test. [online] Available at: http://users.sussex.ac.uk/~grahamh/RM1web/Kruskal-Wallis Handoout2011.pdf [Accessed on 5 May 2018]. 105. Hsiao, S.W., Hung, S.H., Chien, R. and Yeh, C.W., 2014. PasDroid: Real-Time Security Enhancement for Android. 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Birmingham, United Kingdom, 2 - 4 july 2014, IEEE Computer Society. 106. Huang, S.H., 2015. Supervised feature selection: A tutorial, Artificial Intelligence Research, 4, (2) , pp. 22-73. 107. Huang, W., Hou, E., Zheng, L. and Feng, W., 2018. MixDroid : A multi-features and multiclassifiers bagging system for Android malware detection. In: D. Fang, S. Zhu and T. Kuang(eds),6th International Conference on Computer-Aided Design, Manufacturing, Modeling and Simulation, Busan, South Korea, 14-15 April 2018, AIP Publishing, 108. Hurier, M., Allix, K., Bissyandé, T.F., Klein, J. and Traon, Y. Le., 2016. On the Lack of Consensus in Anti-Virus Decisions : Metrics and Insights on Building Ground Truths of Android Malware 1 Introduction. DIMVA 2016 Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, San 109. Sebastián, Spain, 7-8 July 2016, Springer-Verlag.International Data Corporation, 2015. Smartphone OS Market Share, 2015 Q2. [online] Available at: http://www.idc.com/prodserv/smartphone-os-market-share.jsp [Accessed on 03 March 2016]. 110. Ismail, N.S., Robiah, Y. and Abdollah, M.F., 2017. General android malware behavior taxonomy. Defence S and T Technical Bulletin, 10(2), pp. 160–8. 111. Jadhav, S., Dutia, S., Calangutkar, K., Oh, T., Kim, Y.H. and Kim, J.N., 2015. Cloud-based Android Botnet Malware Detection System. 2015 17th International Conference on Advanced Communication Technology (ICACT), PyeongChang, South Korea, 1-3 July 2015, IEEE. 112. Jagtap, A.H. and Lomte, A.C., 2015. Android App Categorization using Naïve Bayes Classifier. International Journal of Computer Applications, 122, (3), pp. 26–9. 113. Jalal, D. and Ezzedine, T., 2019. Performance analysis of machine learning algorithms for water quality monitoring system. 2019 International Conference on Internet of Things, Embedded Systems and Communications, IINTEC 2019 - Proceedings, Gammarth, Tunisia, 20-22 December 2019, IEEE. 114. Jang, J., Kang, H., Woo, J., Mohaisen, A. and Kim, H.K., 2015. Andro-AutoPsy: Antimalware system based on similarity matching of malware and malware creator-centric information. Digital Investigation, 14, pp. 17–35. 115. Jensen, R. and Shen, Q., 2008. Computational Intelligence and Feature Selection: Rough and Fuzzy Approaches, Wiley-IEEE Press. 116. Jeon, J., Micinski, K.K., Vaughan, J.A., Fogel, A., Reddy, N., Foster, J.S. and Millstein, T., 2012. Dr. Android and Mr. Hide: fine-grained permissions in android applications. Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices, Raleigh, USA, October 2012, ACM. 117. Jiang, X., 2011. Security Alert: New DroidKungFu Variant -- AGAIN! -- Found in Alternative Android Markets. [online] Available at: https://www.csc.ncsu.edu/faculty/jiang/DroidKungFu3/ [Accessed on 24 August 2016] 118. Kalla, S. 2013a. Measures of Central Tendency. [online] Available at: https://explorable.com/measures-of-central-tendency [Accessed on 14 November 2018]. 119. Kalla, S. 2013b. Philosophy of Statistics. [online] Available at: https://explorable.com/philosophy-of-statistics [Accessed on 15 April 2018]. 120. Kang, B., Yerima, S.Y., Mclaughlin, K. and Sezer, S., 2016, N-opcode Analysis for Android Malware Classification and Categorization. 2016 International Conference On Cyber Security And Protection Of Digital Services, (Cyber Security), London, United Kingdom, 13-14 June 2016, IEEE. 121. Kang, H., Jang, J., Mohaisen, A. and Kim, H.K., 2015. Detecting and Classifying Android Malware Using Static Analysis along with Creator Information. International Journal of Distributed Sensor Networks - Special issue on Advanced Big Data Management and Analytics for Ubiquitous Sensors, 2015, pp. 1-9. 122. Kaplan, D., 2012. Google employs Bouncer to cleanse Android malware. [online] Available at: http://www.itnews.com.au/news/google-employs-bouncer-to-cleanse-android-malware- 289242 [Accessed on13 July 2016]. 123. Kapse, G., 2015. Detection of Malware on Android based on Application Features. International Journal of Computer Science and Information Technologies, 6 (4), pp. 3561– 3564. 124. Kaspersky, 2016. Asacub Android Trojan: From Information Stealing to Financial Fraud. [online] Available at: http://www.kaspersky.com/about/news/virus/2016/Asacub-Android-Trojan-From-Information-Stealing-to-Financial-Fraud [Accessed on 11 February 2016]. 125. KasperskyLab, 2015, Kaspersky Security Bulletin 2015, Kaspersky. 126. Kate, P.M. and Dhavale, S.V., 2015. Two Phase Static Analysis Technique for Android Malware Detection. Proceedings of the Third International Symposium on Women in Computing and Informatics WIC ’15, Kochi, India, 10-13 August 2015, Publons. 127. Kim, J., Yoon, Y., Yi, K. and Shin, J., 2012. Scandal: Static Analyzer for Detecting Privacy Leaks in Android Applications. IEEE Workshop on Mobile Security Technologies (MoST), San Francisco, USA, 24 May 2012, ResearchBib. 128. Kipyegen, N.J. and Korir, W.P.K., 2013. Importance of Software Documentation. International Journal of Computer Science Issues, 10 (5), pp. 223–8. 129. Klieber, W., Flynn, L., Bhosale, A., Jia, L. and Bauer, L., 2014. Android taint flow analysis for app sets. Proceedings of the 3rd ACM SIGPLAN International Workshop on the State of the Art in Java Program Analysis - SOAP ’14, Edinburgh, United Kingdom, 12 June 2014, Association for Computing Machinery. 130. Knuth, D.E. 1998. Sorting And Searching. The Art of Computer Programming, Addison-Wesley Professional, Reading, MA. 131. Ko, C., Ruschitzka, M. and Levitt, K., 1997. Execution monitoring of security-critical programs in distributed systems: a specification-based approach. Proceedings. 1997 IEEE Symposium on Security and Privacy, Oakland, Canada, 4-7 May 199, IEEE Computer Society. 132. Kohavi, R. and John, H., 1997, Wrappers for feature subset selection. Artificial Intelligence, 97, pp. 273–324. 133. Kural, O.E., Akleylek, S. and Kiliç, E., 2018. New Results on Permission Based Static Analysis for Android Malware. 6th International Symposium on Digital Forensic and Security (ISDFS), IEEE, Antalya, Turkey, 22-25 May 2018, IEEE Xplore. 134. Lashkari, A.H., Kadir, A.F.A., Taheri, L. and Ghorbani, A.A., 2018. Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification. Proceedings - International Carnahan Conference on Security Technology, Montreal, Canada, 22-25 October 2018, IEEE. 135. Leavitt, N., 2005. Mobile phones: The next frontier for hackers?. IEEE Computer Society, 38(4), pp. 20–3. 136. Lee, J., Lee, S. and Lee, H., 2015. Screening Smartphone Applications using Malware Family Signatures. [online] Available at: http://www.sciencedirect.com/science/article/pii/S0167404815000188 [Accessed on 21 February 2015]. 137. Lee, S.-H. and Jin, S.H., 2013. Warning System for Detecting Malicious Applications on Android System. International Journal of Computer and Communication Engineering, 2 (3), pp. 324–7. 138. Li, L., 2017. Static Analysis of Android Apps : A Systematic Literature Review. Information and Software Technology, 88, pp. 67–95. 139. Li, L., Bartel, A., Bissyand, F., Rasthofer, S., Bodden, E., Octeau, D. and Mcdaniel, P., 2015. IccTA : Detecting Inter-Component Privacy Leaks in Android Apps. 37th IEEE International Conference on Software Engineering, Florence, Italy, 16 -24 May 2015, IEEE Press 140. Li, L., Bissyandé, T.F., Octeau, D. and Klein, J., 2016. DroidRA : Taming Reflection to Support Whole-Program Analysis of Android Apps. Proceedings of the 25th International Symposium on Software Testing and Analysis, Saarbrücken, Germany, 18-20 July 2016, ACM. 141. Li, L., Gao, J., Bissyandé, T.F., Ma, L., Xia, X. and Klein, J., 2018. Characterising Deprecated Android APIs. 15th International Conference on Mining Software Repositories, Gothenburg, Sweden, 28-29 May 2018, ACM. 142. Li, Q. and Li, X., 2015. Android Malware Detection Based on Static Analysis of Characteristic Tree. 2015 International Conference on Cyber-Enabled Distributed 143. Computing and Knowledge Discovery, Xi'an, China, 17-19 September 2015, IEEE Computer Society. 144. Li, S., Wu, H., Wan, D. and Zhu, J. 2011. An effective feature selection method for hyperspectral image classification based on genetic algorithm and support vector machine.Knowledge-Based Systems, 24, (1), pp. 40–8. 145. Liang, S. and Du, X., 2014. Permission-combination-based scheme for Android mobile malware detection. 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10-14 June 2014, IEEE Computer Society. 146. Lin, C.-T., 2015. Feature Selection and Extraction for Malware Classification. Journal of Information Science and Engineering, 31, pp. 965–92. 147. Lin, J., Zhao, X. and Li, H., 2017. ‘Target : Category-Based Android Malware Detection Revisited’, Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Australia, 31 January - 3 February 2017, ACM.Lookout, 2011. Security Alert: HongTouTou, New Android Trojan, Found in China. [online]Available at: https://blog.lookout.com/blog/2011/02/15/security-alert-hongtoutou-newandroid-trojan-found-in-china/ [Accessed on 30 November 2015]. 148. Lookout 2013. MouaBad.P : Pocket Dialing For Profit. [online] Available at:https://blog.lookout.com/blog/2013/12/09/mouabad-p-pocket-dialing-for-profit/ [Accessed on 12 December 2015]. 149. Lookout, 2015. Lookout discovers new trojanized adware; 20K popular apps caught in the crossfire. [online] Available at: https://blog.lookout.com/trojanized-adware [Accessed on 12 December 2015]. 150. Luo, L. and Li, L. 2014. Defining and evaluating classification algorithm for highdimensional data based on latent topics. PLoS ONE, 9 (1) , pp. 1-9. 151. Ma, J. and Drury, C.G., 2003. The Human Factors Issues in Data Mining. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Santa Monica, USA, 13 – 17 October 2003, SAGE. 152. Ma, S., Wang, S., Lo, D., Deng, R.H. and Sun, C., 2015. Active Semi-supervised Approach for Checking App Behavior against Its Description. 2015 IEEE 39th Annual Computer Software and Applications Conference, Taichung, Taiwan, 1-5 July 2015, IEEE. 153. Magnaghi, A., Hamada, T. and Katsuyama, T., 2004. A Wavelet-Based Framework for Proactive Detection of Network Misconfigurations. SIGCOMM’04 Workshops, Portland, USA, 30 August - 3 September 2004, ACM. 154. Mann, C. and Starostin, A., 2012. A framework for static detection of privacy leaks in android applications. Proceedings of the 27th Annual ACM Symposium on Applied Computing - SAC ’12, Trento, Italy, 27 Febuary - 1 March 2012, ACM. 155. Mas’Ud, M.Z., Sahib, S., Abdollah, M.F., Selamat, S.R. and Yusof, R., 2014. Analysis of features selection and machine learning classifier in android malware detection. 2014 International Conference on Information Science and Applications (ICISA), Seoul, South Korea, 6 - 9 May 2014, IEEE Computer Society. 156. Massarelli, L., Aniello, L., Ciccotelli, C., Querzoni, L., Ucci, D. and Baldoni, R., 2017. Android Malware Family Classification Based on Resource Consumption over Time. International Conference on Malicious and Unwanted Software (MALWARE), Fajardo, USA, 11-14 Oct 2017, IEEE Computer Society. 157. McAfee, 2015. McAfee Labs Threats Report. [online] Available at: https://www.mcafee.com/br/security-awareness/articles/mcafee-labs-threats-report-aug- 2015.aspx [Accesses on 23 June 2016]. 158. McAfee, 2018, McAfee Mobile Threat Report Q1 2018. [online] Available at:https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2018.pdf [Accessed on 22 Febuary 2019]. 159. Mcwilliams, G. 2013. Malware detection methods for fixed and mobile networks. [online] Available at: https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threatreport- 2018.pdf [Accesses on 03 May 2019]. 160. Merriam-Webster Incorporate, 2015. Merriam-Webster. [online] Available at: http://www.merriam-webster.com/dictionary [Accesses on 17 November 2015]. 161. Milosevic, N., Dehghantanha, A. and Choo, K.R., 2017. Machine learning aided Android malware classification. Computers and Electrical Engineering, vol. 61, pp. 266–74. 162. Mitchell, Tom M., 1997. Machine Learning. [e-book] New York, USA: McGraw-Hill Science. Available at: <http://profsite.um.ac.ir/~monsefi/machine-learning/pdf/Machine-Learning-Tom-Mitchell.pdf> [Accessed on 12 April 2017]. 163. Moghaddam, S.H. and Abbaspour, M., 2014. Sensitivity Analysis of Static Features for Android Malware Detection. The 22nd Iranian Conference on Electrical Engineering (ICEE 2014), Tehran, Iran, 20 - 22 May 2014, IEEE. 164. Mohaisen, A., Alrawi, O. and Mohaisen, M., 2015. AMAL: High-fidelity, behavior-based automated malware analysis and classification. Computers & Security, 52, pp. 1–16. 165. Mohata, V.B., Dakhane, D.M. and Pardhi, R.L., 2013. Mobile Malware Detection 166. Techniques. International Journal of Computer Science & Engineering Technology (IJCSET), 4 (4), pp. 365–71. 167. Moonsamy, V., Rong, J., Liu, S., Li, G. and Batten, L., 2013. Contrasting Permission Patterns between Clean and Malicious Android Application. 9th International ICST Conference, SecureComm 2013, Sydney, Australia, 25 - 27 September 2013, Springer.O’Keeffe, G., 2011, The Four Types of Process Validation. [online] Available at:https://learnaboutgmp.com/good-validation-practices/the-four-types-of-process-validation/[Accessed on 15 July 2016]. 168. Octeau, D., Jha, S. and McDaniel, P., 2012. Retargeting Android applications to Java bytecode. Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, North Carolina, USA, 11-16 November 2012 ACM. 169. Olabenjo, B., 2016. Applying Naive Bayes Classification to Google Play Apps Categorization. arXiv, 1608.08574v1. 170. Oliva Hou, 2012. Trend Mirco: A Look at Google Bouncer. [online] Available at:http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-google-bouncer/[Accessed on 9 January 2016] 171. Onwuzurike, L., Mariconti, E., Andriotis, P., De Cristofaro, E., Ross, G. and Stringhini, G.,2019. Mamadroid: Detecting android malware by building Markov chains of behavioral models (extended version). ACM Transactions on Privacy and Security, 22 (2), pp. 1-34. 172. Panthong, R. and Srivihok, A., 2015. Wrapper Feature Subset Selection for Dimension Reduction Based on Ensemble Learning Algorithm. Procedia Computer Science, 72, pp. 162–9. 173. Pattinson, C., Hajdarevic, K. and Hadzic, A., 2011. The time element in proactive network defense systems. Int. Conf. on Information Technology Interfaces, Dubrovnik, Croatia, 27-30 June 2011, IEEE. 174. Pehlivan, U., Baltaci, N., Acarturk, C. and Baykal, N., 2014. The Analysis of Feature Selection Methods and Classification Algorithms in Permission Based Android Malware Detection. 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS),Florida, USA, 9 - 12 December 2014, IEEE. 175. Peiravian, N. and Zhu, X., 2013. Machine learning for Android malware detection using permission and API calls. Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI, Herndon, USA, 4 - 6 November 2013, IEEE. 176. Peng, H., Gates, C., Sarma, B., Li, N., Qi, Y., Potharaju, R., Nita-Rotaru, C. and Molloy, I., 2012. Using Probabilistic Generative Models for Ranking Risks of Android Apps. Proceedings of the 2012 ACM Conference on Computer and Communications Security, 177. Raleigh North Carolina, USA, 16 - 18 October 2012, ACM. 178. Pennock, R.J. and Chapman, J.W., 1977. Due Process, J.R. Pennock (ed.), New York University Press, New York. 179. Petsas, T., Papadogiannakis, A., Polychronakis, M., Markatos, E.P. and Karagiannis, T., 2013. Rise of the planet of the apps. Proceedings of the 2013 conference on Internet measurement conference - IMC ’13, Barcelona, Spain, 7 October 2013, ACM. 180. Pratama, S.F. 2017, Three-Dimensional Exact Legendre Moment Invarioants For Amphetamine-Type Stimulations Molecular Structure Representation. [Thesis] Universiti Teknikal Malaysia Melaka. 181. Qiao, M., Sung, A.H. and Liu, Q., 2016. Merging permission and api features for android malware detection. Proceedings - 2016 5th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2016, Kumamoto, Japan, 10-14 July 2016, IEEE. 182. R.Dhaya and M.Poongodi, 2014. Detecting software vulnerabilities in android using static analysis. 2014 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), Ramanathapuram, India, 8-10 May 2014, IEEE. 183. Rahim, R., Nurarif, S., Ramadhan, M., Aisyah, S. and Purba, W., 2017. Comparison Searching Process of Linear, Binary and Interpolation Algorithm. International Journal of Applied Science and Technology, 3 (6), pp. 67–75. 184. Rahmani, C., Sharifi, M. and Tafazzoli, T., 2004. An Exprimental Analysis of Proactive Detection of Distributed Denial of Service Attacks. IIT Kanpur Hackers’ Workshop 2004 (IITKHACK04), Kanpur, India, 23-24 February 2004, Scientific Research. 185. Rana, Md. Shohel and Sung Andrew H., 2018. Malware Analysis on Android Using Supervised Machine Learning Techniques. International Journal of Computer and Communication Engineering, 7 (4), pp.178-188. 186. Ranveer, S. and Hiray, S., 2015. Comparative Analysis of Feature Extraction Methods of Malware Detection’, International Journal of Computer Applications, 120 (5), pp. 1–7. 187. Raschka, S., 2018. Model Evaluation , Model Selection , and Algorithm Selection in Machine Learning. arXiv, 1811.12808v2. 188. Rastogi, V., Chen, Y. and Enck, W., 2013. AppsPlayground : Automatic Security Analysis of Smartphone Applications, CODASPY ’13 3rd ACM conference on Data and Application Security and Privac, San Antonio, USA, 18-20 February 2013, ACM. 189. Rastogi, V., Chen, Y. and Jiang, X., 2014. Catch me if you can: Evaluating android antimalware against transformation attacks. IEEE Transactions on Information Forensics and Security, 9, pp. 99–108. 190. Ray, S., 2019. A Quick Review of Machine Learning Algorithms. Proceedings of theInternational Conference on Machine Learning, Big Data, Cloud and Parallel Computing: Trends, Prespectives and Prospects, COMITCon 2019, Faridabad, India, 14-16 Febuary 2019, IEEE. 191. Razali, N.M. and Wah, Y.B., 2011. Power comparisons of Shapiro-Wilk, Kolmogorov-Smirnov, Lilliefors and Anderson-Darling tests, Journal of Statistical Modeling and Analytics, 2 (1), pp. 21–33. 192. Redondo, M.F., Torres Sospedra, J. and Hernandez Espinosa, C., 2006. Training RBFs Networks : A Comparison Among Supervised and Not Supervised Algorithms. Neural Information Processing: 13th International Conference, Hong Kong, China, 3 - 6 October 2006, Springer Berlin Heidelberg. 193. Reed, B., 2019. Test of 250 Popular Android Mobile Apps Reveals that 70% Leak Sensitive Personal Data. [online] Available at: https://www.nowsecure.com/blog/2019/06/ 06/test-of-250-popular-android-mobile-apps-reveal-that-70-leak-sensitive-personal-data/ [Accessedon 30 September 2019]. 194. Reitermanov, Z., 2010. Data Splitting. WDS'10 Proceedings of Contributed Papers, Prague,Czech Republic, 1-4 June 2010, Springer. 195. Rennes, F.-, Lalande, J., Bourges, F.-, Leslous, M. and Tong, V.V.T., 2016. Kharon dataset Android malware under a microscope. Learning from Authoritative Security Experiment Results, San Jose, United States, 9 December 2016, USENIX Association. 196. Richardson, R., 2011. 15th Annual 2010/2011 Computer Crime and Security Survey. [online]Computer Security Institute. p.23. Available at: https://www.citethisforme.com/guides/harvard/how-to-cite-a-report [Accessed on 26 May 2016] 197. Robiah, Y., Siti Rahayu, S., Mohd Zaki, M., Shahrin, S., Faizal, M.A. and Marliza, R., 2009.A New Generic Taxonomy on Hybrid Malware Detection Technique. (IJCSIS) International Journal of Computer Science and Information Security, 5 (1), pp. 56–61. 198. Roscoe, J.T., 1975. Fundamental Research Statistics for the Behavioral Sciences. New York:Holt Rinehart & Winston. 199. Rothe, J., 2015. Economics and Computation : An Introduction to Algorithmic Game Theory,Computational Social Choice, and Fair Division. In: J. Rothe (ed.), Springer. 200. Rovelli, P. and Vigfusson, Y., 2014. PMDS : Permission-based Malware Detection System.10th International Conference on Information Systems Security (ICISS 2014), Hyderabad,India, 16 - 20 December 2014, Springer. 201. S. Yuksel, A., H. Zaim, A. and A. Aydin, M., 2014. A Comprehensive Analysis of AndroidSecurity and Proposed Solutions, International Journal of Computer Network and Information Security, 6 (120), pp. 9–20. 202. Sadeghi, A., Bagheri, H. and Malek, S., 2015. Analysis of Android Inter-App SecurityVulnerabilities Using COVERT. 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Florence, Italy, 16 - 24 May 2015, IEEE. 203. Sahs, J. and Khan, L., 2012, A Machine Learning Approach to Android Malware Detection.2012 European Intelligence and Security Informatics Conference, Odense, Denmark, 22 -24 August 2012, IEEE. 204. Samani, R. and Beek, C., 2018, McAfee Labs Threats Report. [online] Available at:https://www.mcafee.com/enterprise/en-us/assets/reports/rp-quarterly-threats-dec-2018.pdf[Accessed on 13 May 2019]. 205. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X. and Bringas, P.G., 2012. On the automatic categorisation of android applications. 2012 IEEE Consumer Communications and Networking Conference, CCNC’2012, Nevada, USA, 14-17 January 2012, IEEE. 206. Sanz, B., Santos, I., Laorden, C., Ugarte-Pedrero, X., Bringas, P.G. and Álvarez, G., 2013.PUMA: Permission usage to detect malware in android. International Joint Conference CISIS’12- ICEUTE’12-SOCO’12 Special Sessions, Ostrava, Czech Republic, 5-7 September 2012 Springer. 207. Sarma, B., Li, N., Gates, C., Potharaju, R., Nita-rotaru, C. and Molloy, I., 2012. Android Permissions: A Perspective Combining Risks and Benefits. Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT), New Jersey, USA, June 2012, 20 - 22 June 2012, ACM. 208. Sarwar, G., Mehani, O., Borely, R. and Kaafar, M.A., 2013. On the Effectiveness of Dynamic Taint Analysis for Protecting Against Private Information Leaks on Android-based Devices. SECRYPT 2013, 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July 2013, SciTePress. 209. Sato, R., Chiba, D. and Goto, S., 2013. Detecting Android Malware by Analyzing Manifest Files. Proceedings of the Asia-Pacific Advanced Network 2013, 36, pp. 23 -31. 210. Sbîrlea, D., Burke, M.G., Guarnieri, S., Pistoia, M. and Sarkar, V., 2013. Automatic Detection of Inter-application Permission Leaks in Android Applications. IBM Journal of Research and Development, 57 (6), pp. 1–20. 211. Schmeelk, S., Yang, J. and Aho, A,. 2015. Android Malware Static Analysis Techniques.CISR ’15 Proceedings of the 10th Annual Cyber and Information Security Research Conference, Oak Ridge, USA, 7-9 April 2015, ACM. 212. Schmidt, A., Schmidt, H., Clausen, J., Camtepe, A. and Albayrak, S., 2008. Enhancing Security of Linux-based Android Devices. Proceedings of 15th International Linux Kongress, Heidelberg, Germany, 7-10 October 2008, Springer. 213. Schmidt, A.D., Bye, R., Schmidt, H.G., Clausen, J., Kiraz, O., Yüksel, K. a., Camtepe, S. a. and Albayrak, S., 2009. Static analysis of executables for collaborative malware detection on android. IEEE International Conference on Communications, Dresden, Germany, 14-18 June 2009, IEEE. 214. Schneider, J., 1997, Cross Validation. [online] Available at:https://www.cs.cmu.edu/~schneide/tut5/node42.html [Accessed on 22 August 2017]. 215. Seo, S.H., Gupta, A., Sallam, A.M., Bertino, E. and Yim, K., 2014. Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications, 38 (1), pp. 43–53. 216. Shabtai, A., Fledel, Y. and Elovici, Y., 2010. Automated static code analysis for classifying android applications using machine learning. Proceedings - 2010 International Conference on Computational Intelligence and Security, CIS 2010, Guangxi Zhuang, China, 11-14 December 2010, IEEE Computer Society. 217. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S. and Glezer, C., 2010. Google android: A comprehensive security assessment. IEEE Security and Privacy, 8 (2), pp. 35–44. 218. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C. and Weiss, Y., 2012. "Andromaly ”: a behavioral malware detection framework for android devices. Journal of Intelligent Information System, 38, pp. 161–90. 219. Shahriar, H., Islam, M. and Clincy, V., 2017. Android Malware Detection Using Permission Analysis. SoutheastCon 2017, Charlotte, USA, 30 March – 2 April 2017, IEEE. 220. Sharma, A. and Dash, S.K., 2014. Mining API Calls and Permissions for Android Malware Detection. International Conference on Cryptology and Network Security, Crete, Greece, 22-24 October 2014, Springer. 221. Sharma, A. and Sahay, S.K., 2018. An Investigation of the Classi fi ers to Detect Android Malicious Apps Malware detection Machine learning. Information and Communication Technology. Advances in Intelligent Systems and Computing, Singapore, 29-31 December 2018, Springer. 222. Sharma, M. and Kaur, E.T., 2014. A Study on Network Intrusion Detection Based on Proactive Mechanism. Int. Journal of Emerging Research in Management & Technology, 18 (1), pp. 9–15. 223. Shijo, P.V. and Salim, A., 2015. Integrated Static and Dynamic Analysis for Malware Detection. Procedia Computer Science, 46, pp. 804–11. 224. Smith. P., 2017. The Importance of Documentation.[online] Available at:https://www.addictionacademy.com/2017/03/the-importance-of-documentation/ [Accessed on 8 November 2019]. 225. Spreitzenbarth, M., Schreck, T., Echtler, F., Arp, D. and Hoffmann, J., 2015. Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques.International Journal of Information Security, 14 (2), pp. 141–153. 226. Stakhanova, N., Basu, S. and Wong, J., 2007. A taxonomy of intrusion response systems.International Journal of Information and Computer Security, 1 (1/2), p. 169-184. 227. Su, M.-Y. and Fung, K.-T., 2016. Detection of Android Malware by Static Analysis on Permissions and Sensitive Functions. Eighth International Conference on Ubiquitous and Future Networks (ICUFN), Vienna, Austria, 5-8 July 2016, IEEE. 228. Su, M.Y. and Chang, W.C., 2014. Permission-based malware detection mechanisms for smart phones. The International Conference on Information Networking 2014 (ICOIN2014),Phuket, Thailand, 10-12 Feb 2014, IEEE. 229. Suarez-Tangil, G., Tapiador, J.E., Peris-Lopez, P. and Ribagorda, A., 2014. Evolution,detection and analysis of malware for smart devices. IEEE Communications Surveys and Tutorials, 16 (2), pp. 961–87. 230. Sufatrio, Tan, D.J.J., Chua, T. and Thing, V.L.L., 2015. Securing Android : A Survey ,Taxonomy , and Challenges. ACM Computing Surveys (CSUR), 47 (4), pp. 1–45. 231. Sui, B., 2013. Information Gain Feature Selection Based on Feature Interactions. [Thesis] University of Houston. 232. Symantec, 2012, Android.Ackposts. [onlilne] Available at: <https://www.symantec.com security_response/writeup.jsp?docid=2012-072302-3943-99 [Accessed on 13 October 2015]. 233. Talha, K.A., Alper, D.I. and Aydin, C., 2015. APK Auditor: Permission-based Android malware detection system. Digital Investigation. [onlilne] Available at:, http://www.sciencedirect.com/science/article/pii/S174228761500002X [Accessed on March 2015]. 234. Tam, K., Feizollah, A., Anuar, N.B., Salleh, R. and Cavallaro, L., 2017 The Evolution of Android Malware and Android Analysis Techniques. ACM Computing Surveys, 49, no. 4. 235. Tchakounte, F., 2014. Permission-based malware detection mechanisms on Android: analysis and perspectives. Journal of Computer Science and Software Application, 1, (2), pp.63–77.Aaronhlandau, 2012. A Brief History of Mobile Malware. [online] Available at:https://www.yumpu.com/en/document/read/54198913/a-brief-history-of-mobile-malware [Accessed on 22 February 2017] 236. Upadhyay, D., Munghate, M., Dharbey, S. and Bondre, A., 2016. Detecting Malicious Behavior of Android Applications. International Journal of Science Technology &Engineering, 2 (10), pp. 663–668. 237. Vasilomanolakis, E., Karuppayah, S., Muehlhaeuser, M. and Fischer, M., 2015. Taxonomy and Survey of Collaborative Intrusion Detection, ACM Computing Surveys. 47(4), pp.1–35. 238. Vines, P., Dietl, W., Amorim, M. and Ernst, M.D., 2015. Static Analysis of Implicit Control Flow : Resolving Java Reflection and Android Intents ( extended version ). 2015 30th EEE/ACM International Conference on Automated Software Engineering, Lincoln, USA, 9 November 2015, IEEE. 239. Virustotal, 2004. VirusTotal. [online] Available at: https://www.virustotal.com/ [Accessed on 9 December 2015]. 240. Wain, K., Au, Y., Zhou, Y.F., Huang, Z. and Lie, D., 2012. PScout : Analyzing the Android Permission Specificatio. CCS ’12 Proceedings of the 2012 ACM conference on Computer and communications security, Raleigh, USA , 16-18 October 2012, ACM. 241. Wang, P. and Wang, Y.-S., 2014. Malware behavioural detection and vaccine development by using a support vector model classifier. Journal of Computer and System Sciences, 81 (6),pp. 1012-1026. 242. Wang, W., Wang, X., Feng, D., Liu, J., Han, Z. and Zhang, X., 2014. Exploring permissioninduced risk in Android applications for malicious application detection. IEEE Transactions on Information Forensics and Security, 9 (11), pp. 1869 – 82. 243. Wang, X., Wang, J. and Xiaolan, Z., 2016. A Static Android Malwar Detection Based on Actual Used Permissions Combination and API Calls. International Journal of Computer,Electrical, Automation, Control and Information Engineering, 10 (9), pp. 1486–93. 244. Webb, A.R. and Copsey, K.D., 2011. Feature Selection and Extraction. In: Statistical Pattern Recognition, 3rd ed., West Sussex: Wiley. 245. Wei, X., Gomez, L., Neamtiu, I. and Faloutsos, M., 2012. Permission Evolution in the Android Ecosystem. ACSAC ’12 Proceedings of the 28th Annual Computer Security Applications Conference, Florida, USA, 9 - 13 December 2012, ACM. 246. Wilk, M.B. and Gnanadesikan, R., 1968. Probability plotting methods for the analysis of data. Biometrika, 55 (1), pp. 1–17. 247. Wolfe, B., Elish, K.O. and Yao, D.D., 2014. Comprehensive Behavior Profiling for Proactive Android Malware Detection. ISC: International Conference on Information Security. Hong Kong, China, 12-14 October 2014, Springer. 248. Wu, D.J., Mao, C.H., Wei, T.E., Lee, H.M. and Wu, K.P., 2012. DroidMat: Android malware detection through manifest and API calls tracing. Proceedings of the 2012 7th Asia Joint 249. Conference on Information Security, AsiaJCIS 2012, Tokyo, Japan, 9-10 August 2012, IEEE. 250. Xiaohui, Y., Yubo, S. and Fei, C., 2013. Android's Sensitive Data Leakage Detection Based on Api Monitoring. MINES ’13 Proceedings of the 2013 Fifth International Conference on Multimedia Information Networking and Security, Beijing, China, 1 November 2013, IEEE. 251. Xu, Y. and Goodacre, R., 2018. On Splitting Training and Validation Set : A Comparative Study of Cross ‑ Validation , Bootstrap and Systematic Sampling for Estimating the Generalization Performance of Supervised Learning. Journal of Analysis and Testing, 2 (3), pp. 249–62. 252. Yang, C., Yang, G., Gehani, A., Yegneswaran, V., Tariq, D. and Gu, G., 2015. Using provenance patterns to vet sensitive behaviors in android apps. Security and Privacy in Communication Networks, 164, pp. 58–77. 253. Yang, M., Wang, S., Ling, Z., Liu, Y. and Ni, Z., 2017. Detection of malicious behavior in android apps through API calls and permission uses analysis. Concurrency Computation, 29 (19), pp. 1–13. 254. Yang, Q., Hu, L., Sun, S., Qiao, K. and Song, L., 2015. Information Security Practice and Experience. Information Security Practice and Experience, 9065, pp. 209–19. 255. Yang, S., Yan, D., Wu, H., Wang, Y. and Rountev, A., 2015. Static Control-Flow Analysis of User-Driven Callbacks in Android Applications. 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Florence, Italy, 16-24 May 2015, IEEE. 256. Yerima, S.Y., Sezer, S. and McWilliams, G., 2014. Analysis of Bayesian classificationbased approaches for Android malware detection. IET Information Security, 8, pp. 25–36. 257. Yerima, S.Y., Sezer, S., McWilliams, G. and Muttik, I., 2013. A New Android Malware Detection Approach Using Bayesian Classification. 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), Barcelona, Spain, 25-28 March 2013, IEEE. 258. Yu, L. and Liu, H., 2003. Feature Selection for High-Dimensional Data : A Fast Correlation-Based Filter Solution. Twentieth International Conference on Machine Learning, Washington DC, USA, 21-24 August 2003, ACM. 259. Yuan, C., Wei, S., Wang, Y., You, Y. and ZiLiang, S., 2016.Android Applications Categorization Using Bayesian Classification. 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Chengdu, China, 13-15 October 2016, IEEE. 260. Zar, J.H., 1999, Biostatistical Analysis, 4th ed., Michigan: Prentice Hall. 261. Zhang, X. and Jin, Z., 2016. A New Semantics-Based Android Malware Detection. 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China,14-17 October 2016, IEEE. 262. Zhao, K., Zhang, D., Su, X. and Li, W., 2015. Fest: A feature extraction and selection tool for Android malware detection. 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6-9 July 2015, IEEE Computer Society. 263. Zhen, Y., Xiangfei, N., Weiran, X. and Jun, G., 2006. An approach to spam detection by Naive bayes ensemble based on decision induction. ISDA 2006: Sixth International Conference on Intelligent Systems Design and Applications, Jinan, China, 16-18 October 2006, IEEE Computer Society. 264. Zheng, M., Sun, M. and Lui, J.C.S., 2013. DroidAnalytics : A Signature Based Analytic System to Collect , Extract , Analyze and Associate Android Malware. 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Melbourne, Australia, 16-18 July 2013, IEEE. 265. Zhongyang, Y., Xin, Z., Mao, B. and Xie, L., 2013. DroidAlarm: An all-sided static analysis tool for Android privilege-escalation malware. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, Hangzhou, Chin, 8-10 May 2013, ACM. 266. Zhou, Y. and Jiang, X., 2012. Dissecting Android malware: Characterization and evolution.Proceedings - IEEE Symposium on Security and Privacy, San Francisco, USA, 24-25 May 2012, IEEE Computer Society.