• A
  • A
  • A
  • АБВ
  • АБВ
  • АБВ
  • A
  • A
  • A
  • A
  • A
Обычная версия сайта
  • RU
  • EN
  • HSE University
  • Publications
  • Book chapter
  • Automated Static Analysis and Classification of Android Malware using Permission and API Calls Models
  • RU
  • EN
Расширенный поиск
Высшая школа экономики
Национальный исследовательский университет
Priority areas
  • business informatics
  • economics
  • engineering science
  • humanitarian
  • IT and mathematics
  • law
  • management
  • mathematics
  • sociology
  • state and public administration
by year
  • 2027
  • 2026
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • 2004
  • 2003
  • 2002
  • 2001
  • 2000
  • 1999
  • 1998
  • 1997
  • 1996
  • 1995
  • 1994
  • 1993
  • 1992
  • 1991
  • 1990
  • 1989
  • 1988
  • 1987
  • 1986
  • 1985
  • 1984
  • 1983
  • 1982
  • 1981
  • 1980
  • 1979
  • 1978
  • 1977
  • 1976
  • 1975
  • 1974
  • 1973
  • 1972
  • 1971
  • 1970
  • 1969
  • 1968
  • 1967
  • 1966
  • 1965
  • 1964
  • 1963
  • 1958
  • More
Subject
News
May 20, 2026
HSE University Opens First Representative Office of Satellite Laboratory in Brazil
HSE University-St Petersburg opened a representative office of the Satellite Laboratory on Social Entrepreneurship at the University of Campinas in Brazil. The platform is going to unite research and educational projects in the spheres of sustainable development, communications and social innovations.
May 18, 2026
The 'Second Shift' Is Not Why Women Avoid News
Women are more likely than men to avoid political and economic news, but the reasons for this behaviour are linked less to structural inequality or family-related stress than to personal attitudes and the emotional perception of news content. This conclusion was reached by HSE researchers after analysing data from a large-scale survey of more than 10,000 residents across 61 regions of Russia. The study findings have been published in Woman in Russian Society.
May 15, 2026
Preserving Rationality in a Period of Turbulence
The HSE International Laboratory for Logic, Linguistics and Formal Philosophy studies logic and rationality in a transformed world characterised by a diversity of logical systems and rational agents. The laboratory supports and develops academic ties with Russian and international partners. The HSE News Service spoke with the head of the laboratory, Prof. Elena Dragalina-Chernaya, about its work.

 

Have you spotted a typo?
Highlight it, click Ctrl+Enter and send us a message. Thank you for your help!

Publications
  • Books
  • Articles
  • Chapters of books
  • Working papers
  • Report a publication
  • Research at HSE

?

Automated Static Analysis and Classification of Android Malware using Permission and API Calls Models

P. 243–252.
Skovoroda A., Gamaunov D.

In this paper we propose a heuristic approach to static analysis of Android applications based on matching suspicious applications with the predefined malware models. Static models are built from Android capabilities and Android Framework API call chains used by the application. All of the analysis steps and model construction are fully automated. Therefore, the method can be easily deployed as one of the automated checks provided by mobile application marketplaces or other interested organizations. Using the proposed method we analyzed the Drebin and ISCX malware collections in order to find possible relationships and dependencies between samples in collections, and a large fraction of Google Play apps collected between 2013 and 2016 representing benign data. Analysis results show that a combination of relatively simple static features represented by permissions and API call chains is enough to perform binary classification between malware and benign apps, and even find the corresponding malware family, with an appropriate false positive rate of about 3% (less than 1% in case of filtering adware). Malware collections exploration results show that Android malware rarely uses obfuscation or encryption techniques to make static analysis more difficult, which is quite the opposite of what we see in the case of the 'Wintel' endpoint platform family. We also provide the experiment-based comparison with the previously proposed state-of-the-art Android malware detection method adagio.

Language: English
DOI
Keywords: information securitystatic analysisanalytical modelsAndroid malware

In book

2017 15th Annual Conference on Privacy, Security and Trust (PST)
IEEE, 2017.
Similar publications
On the Use of Metaheuristics of Different Classes and an Island Model for Image Steganography
Anna Melman, Mikhail Alexandrov, Oleg Evsutin, , in: 2025 XIХ International Symposium on Problems of Redundancy in Information and Control Systems (Redundancy), 5-7 Nov. 2025.: IEEE, 2025. P. 1–6.
Digital steganography protects the privacy of data by hiding them in some digital containers, such as images. Protection of confidential messages by hiding them in digital images faces the problem of balancing the main performance indicators, i.e. embedding imperceptibility and capacity. Metaheuristic optimization can be used to flexibly customize embedding options, including parameters and locations ...
Added: January 28, 2026
Analyzing the Robustness of Vision & Language Models
Shirnin A., Andreev N., Potapova S. et al., IEEE/ACM Transactions on Speech and Language Processing 2024 Vol. 32 P. 2751–2763
We present an approach to evaluate the robustness of pre-trained vision and language (V&L) models to noise in input data. Given a source image/text, we perturb it using standard computer vision (CV) / natural language processing (NLP) techniques and feed it to a V&L model. To track performance changes, we explore the problem of visual ...
Added: July 19, 2024
ПРОБЛЕМЫ И ВЫЗОВЫ ЦИФРОВОГО ОБЩЕСТВА: ТЕНДЕНЦИИ РАЗВИТИЯ ПРАВОВОГО РЕГУЛИРОВАНИЯ ЦИФРОВЫХ ТРАНСФОРМАЦИЙ (НАУЧНЫЙ ОБЗОР)
Kovaleva N. N., Zhirnova N., Информационное право 2024 № 1(79) С. 40–43
The review is based on the results of the 4.0. International Scientific and Practical Conference «Problems and Challenges of Digital Society: Trends in the Development of Legal Regulation of Digital Transformations», held on May 24-25, 2023 at HSE University. The conference discussed the current trends of scientific research in the information sphere, the transformation of ...
Added: June 28, 2024
Разработка регионального модельного нормативного акта о правовом информировании как направление правовой политики в сфере информационной безопасности
Соколов А. Ю., Soldatkina O., Вестник Пермского университета. Юридические науки 2023 № 4 (62) С. 602–612
Introduction: the study discusses legal information distribution as an important tool of legal policy in the field of information security, as its priority aimed at ensuring a proper level of information security of the population. A promising direction in this area is shifting a focus on the activities of constituent entities, including those aimed at ...
Added: January 19, 2024
Multi-level conceptual model of efficiency control in supply chain management
Strimovskaya A., Barykin S., Volkova E. et al., IFAC-PapersOnLine 2023 Vol. 56 No. 2 P. 1809–1814
Modern tendencies of rapid economic growth, demand-driven market, highly uncertain economic environment with various disruption sources simultaneously with targets for sustainable development explains the increased interest to advanced solutions in supply chain management. The research paper presents a multi-level efficiency control model presenting analytical sequences and integral method of factor analysis for logistics performance indicators ...
Added: January 17, 2024
Analytical Model of Multi-link Operation in Saturated Heterogeneous Wi-Fi 7 Networks
Korolev N., Ilya Levitsky, Khorov E., IEEE Wireless Communications Letters 2022 Vol. 11 No. 12 P. 2546–2549
The upcoming IEEE 802.11be standard, known as Wi-Fi 7, introduces the multi-link operation, which allows a Wi-Fi device to transmit and receive packets via several links simultaneously. However, in some cases, e.g., when the spectral distance between two channels used by the links is small, cross-link interference caused by the transmission on one link can ...
Added: October 26, 2022
Kotlin с точки зрения разработчика статического анализатора
Afanasyev V., Поляков С. А., Бородин А. Е. et al., Труды Института системного программирования РАН 2021 Т. 33 № 6 С. 67–82
The paper describes a static analysis for finding defects and computing metrics for programs written in the Kotlin language. The analysis is implemented in the Svace static analyzer developed at ISP RAS. The paper focuses on the problems we met during implementation, the approaches we used to solve them, and the experimental results for the ...
Added: September 7, 2022
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS 2022)
IEEE, 2022.
Continuing with the outstanding success of IEEE IEMCON, IEEE CCWC, IEEE UEMCON, IEMANTENNA we are proud to present IEMTRONICS 2022 (International IOT, Electronics and Mechatronics Conference) which will be held during 1st- 4th June, 2022 at Toronto, Canada, in online mode. Keeping in mind the pandemic situation prevalent globally due to Covid 19 and following ...
Added: July 20, 2022
Prospects of Legal Regulating Use of Driverless Transportation Vehicles in the Russian Federation
Deineko A.G., Legal Issues in the Digital Age 2021 No. 3 P. 33–57
The article reviews the new Russian legislation introducing the experimental legal regime for the use of highly automated transportation vehicles (HATVs) (driverless vehicles) on public roads. The article analyzes strategic planning documents related to the subject, such as the governmental Traffic Safety Concept for Public Roads with Driverless Transportation Vehicles (DTVs) and the European Union’s ...
Added: March 18, 2022
On the Efficiency of Combinatorial Generation for Adaptive Image Steganography
Melman Anna, Evsyutin O., Шабля Ю. В., , in: Proceedings of VII International Conference «Engineering & Telecommunication — En&T-2021.: IEEE, 2021.
The widespread use of remote communication technologies in various fields leads to new tasks of information security. Steganographic embedding is an effective method of protecting information transmitted over an open communication channel. Steganography techniques hide information in digital objects by embedding, making it invisible to an attacker. The most common covers for hiding additional information ...
Added: December 1, 2021
SPICE Modeling of Small-Size Bulk, SOI and SOS MOSFETs at Deep-Cryogenic Temperatures
Ismail-zade M. R., Petrosyants K. O., Sambursky L. M. et al., , in: 2020 26th International Workshop on Thermal Investigations of ICs and Systems (THERMINIC).: IEEE, 2020. P. 97–103.
A set of modified compact SPICE models of various flavours of MOSFETs (fabricated by bulk, SOI and SOS technologies) is presented for circuit simulation in the deep-cryogenic temperature range down to 4 K, which is important for space applications and development of scalable quantum computers. All models are constructed using the approach combining macromodeling based ...
Added: June 5, 2021
Формирование профилей стандартов в обеспечение требуемого уровня качества информационной безопасности
Starykh V., Mukhamedzyanov G., В кн.: Actual Problems of System and Software Engineering. Proceedings of the 6th International Conference Actual Problems of System and Software Engineering. Moscow, Russia, 12-14 November, 2019Vol. 2514.: CEUR Workshop Proceedings, 2019. С. 193–199.
The article deals with the solution of the problems of the formation and use of applied ontologies as a Abstract: The purpose of this article - the forming of theoretical foundations, analysis of working tools and technologies for the construction of an information system that allows to optimize the scanning of IS for compliance with information ...
Added: February 2, 2021
Asymptotics for filtration of polydisperse suspension with small impurities
Kuzmina, L.I., Osipov, Y. V., Gorbunova, T. N., Applied Mathematics and Mechanics (English Edition) 2021 Vol. 42 No. 1 P. 109–126
A model for deep bed filtration of a polydisperse suspension with small impurities in a porous medium is considered. Different suspended particles move with the same velocity as the carrier water and get blocked in the pore throats due to the size-exclusion mechanism of particle retention. A solution of the model in the form of a traveling wave is ...
Added: January 7, 2021
Advances in Neural Information Processing Systems 31
Andrey Malinin, Gales M., Curran Associates, Inc., 2018.
Estimating how uncertain an AI system is in its predictions is important to improve the safety of such systems. Uncertainty in predictive can result from uncertainty in model parameters, irreducible \emph{data uncertainty} and uncertainty due to distributional mismatch between the test and training data distributions. Different actions might be taken depending on the source of ...
Added: April 20, 2020
Возможности и перспективы развития приложений родительского контроля как средства обеспечения безопасности детей и подростков в сети Интернет
Денисов Д. В., Прикладная информатика 2019 Т. 14 № 2 С. 89–104
In modern conditions of blurring the boundaries between the virtual and the real world, as well as the transition of virtual threats into reality, the issues of user security on the Internet are becoming increasingly important. This is especially true for children and adolescents who are at high risk because of their young age, lack ...
Added: September 25, 2019
Building an Intelligent Comprehensive Scoring Model Based on Fuzzy Technologies
Nazarov D., Efremov S. G., , in: 2019 IEEE 21st Conference on Business Informatics (CBI)Vol. 2.: The Institute of Electrical and Electronics Engineers, Inc. , 2019. P. 16–19.
The article is devoted to the analysis of scoring models used in one of the Russian commercial banks. The purpose of the article is to build a comprehensive scoring model that takes into account various groups of additional variables that increase the accuracy of the model and reduce the default percentage of borrowers. To construct ...
Added: September 24, 2019
Обзор методов встраивания информации в цифровые объекты для обеспечения безопасности в «интернете вещей»
Evsyutin O., Кокурина А.С., Мещеряков Р. В., Компьютерная оптика 2019 Т. 43 № 1 С. 137–154
Transmission, processing and storage of information in the infrastructure of the Internet of Things are related to the necessity for solving a number of problems in information security. The main difficulty lies in the fact that the infrastructure of the Internet of Things is not homogeneous and contains many different devices, including those with limited ...
Added: September 3, 2019
17TH IEEE INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES, EUROCON 2017
Institute of Electrical and Electronics Engineers Inc., 2017.
Added: April 26, 2019
ANALYSIS OF THE STATE OF INFORMATION SECURITY ON THE BASIS OF SURIOUS EMISSION ELECTRONIC COMPONENTS
Lebedev I., Bazhaev N. A., Sukhoparov M. E. et al., , in: Proceedings of the 20th Conference of Open Innovations Association FRUCT.: FRUCT Oy, 2017. P. 216–221.
The article deals with an approach to determining the state of information security based on the analysis of spurious emission of electromagnetic components. Attention is drawn to the possibility of the formation of the data, obtain samples for the analysis of the state of the information security. An experiment in result of which the amplitude-frequency ...
Added: April 23, 2019
Studying the Effect of Selection of the Sign and Ratio in the Formation of a Signature in a Program Identification Problem
Salakhutdinova K. I., Krivtsova I. E., Sukhoparov M. E. et al., Automatic Control and Computer Sciences 2018 Vol. 8 No. 52 P. 1101–1104
Abstract: Properties of using various assembler commands, as well as their combined application, have been investigated in order to prepare a final determination as to whether they belong to a known program. Conclusions on the effect of the ratio used in the creation of unified signatures on result of identifications are presented. ...
Added: April 23, 2019
  • About
  • About
  • Key Figures & Facts
  • Sustainability at HSE University
  • Faculties & Departments
  • International Partnerships
  • Faculty & Staff
  • HSE Buildings
  • HSE University for Persons with Disabilities
  • Public Enquiries
  • Studies
  • Admissions
  • Programme Catalogue
  • Undergraduate
  • Graduate
  • Exchange Programmes
  • Summer University
  • Summer Schools
  • Semester in Moscow
  • Business Internship
  • Research
  • International Laboratories
  • Research Centres
  • Research Projects
  • Monitoring Studies
  • Conferences & Seminars
  • Academic Jobs
  • Yasin (April) International Academic Conference on Economic and Social Development
  • Media & Resources
  • Publications by staff
  • HSE Journals
  • Publishing House
  • iq.hse.ru: commentary by HSE experts
  • Library
  • Economic & Social Data Archive
  • Video
  • HSE Repository of Socio-Economic Information
  • HSE1993–2026
  • Contacts
  • Copyright
  • Privacy Policy
  • Site Map
Edit