시스템 API 호출 순서 정보를 통한 안드로이드 악성 코드 패밀리 분류 기법

Vol. 35, No. 1, pp. 67-78, 2월. 2025
10.13089/JKIISC.2025.35.1.67, Full Text:
Keywords: Android Malware, Malware classification, Malware analysis, Malware detection
Abstract

Today, mobile devices have become ubiquitous and have a large user base. The importance of security for these mobile devices is growing. To this end, classification and detection methods using Android system API call data have been actively researched. Our proposed classification system API call sequence data to analyze the behavior patterns of malicious codes that exhibit similar variable names and techniques. We establish classification criteria based on the DTW algorithm for each family, enabling more accurate classification of malicious code families. In the future, we plan to acquire more datasets to collect system API call sequence data information and apply it to machine learning or conduct research on classification in parallel with static analysis.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
최재민, 박기웅, 최상훈, "Android Malware Family Classification Techniques Using System API Call Sequence Data," Journal of The Korea Institute of Information Security and Cryptology, vol. 35, no. 1, pp. 67-78, 2025. DOI: 10.13089/JKIISC.2025.35.1.67.

[ACM Style]
최재민, 박기웅, and 최상훈. 2025. Android Malware Family Classification Techniques Using System API Call Sequence Data. Journal of The Korea Institute of Information Security and Cryptology, 35, 1, (2025), 67-78. DOI: 10.13089/JKIISC.2025.35.1.67.