Yu-Chen ChangSheng-De WangSHENG-DE WANG2019-10-242019-10-242017https://scholars.lib.ntu.edu.tw/handle/123456789/427397In this paper, we propose the concept of attack scenarios, which can be learned and selected from a set of malicious applications and described by sets of Android APIs, to characterize Android malware. Because of its characteristics that produce almost no false-positive, attack scenarios can be used as a pre-filter for machine-learning based detectors to enhance the detection performance at low false-positive rate. By combining different machine learning techniques, we demonstrate that the proposed approach can increase the detection rates. To evaluate our approach, we analyze 20,914 Android application containing 3,145 malicious samples on two different machine learning techniques, KNN and SVM. The experiment results show that the proposed approach can raise the detection rate up to 95.9% malware at 1% false positive rate and 95.9% malware at 0.1% false positive rate respectively. © 2016 IEEE.Android; Attack scenario; Machine learning; Malware detection; Static analysis[SDGs]SDG11[SDGs]SDG16Android (operating system); Artificial intelligence; Computer crime; Learning algorithms; Learning systems; Smart city; Static analysis; Android; Android applications; Attack scenarios; Detection performance; False positive rates; ITS applications; Machine learning techniques; Malware detection; MalwareThe Concept of Attack Scenarios and its Applications in Android Malware Detectionconference paper10.1109/hpcc-smartcity-dss.2016.02112-s2.0-85013645007