IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing (TDSC) is a bimonthly journal that publishes archival research results focusing on foundations, methodologies, and mechanisms that support the achievement—through design, modeling, and evaluation—of systems and networks that are dependable and secure to the desired degree without compromising performance. Read the full scope of TDSC
IEEE Transactions on Dependable and Secure Computing (TDSC) has moved to the OnlinePlus publication model.
From the July/August 2015 issue
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code
By Lei Cen, Christoher S. Gates, Luo Si, and Ninghui Li
Mobile devices are an important part of our everyday lives, and the Android platform has become a market leader. In recent years a number of approaches for Android malware detection have been proposed, using permissions, source code analysis, or dynamic analysis. In this paper, we propose to use a probabilistic discriminative model based on regularized logistic regression for Android malware detection. Through extensive experimental evaluation, we demonstrate that it can generate probabilistic outputs with highly accurate classification results. In particular, we propose to use Android API calls as features extracted from decompiled source code, and analyze and explore issues in feature granularity, feature representation, feature selection, and regularization. We show that the probabilistic discriminative model also works well with permissions, and substantially outperforms the state-of-the-art methods for Android malware detection with application permissions. Furthermore, the discriminative learning model achieves the best detection results by combining both decompiled source code and application permissions. To the best of our knowledge, this is the first research that proposes probabilistic discriminative model for Android malware detection with a thorough study of desired representation of decompiled source code and is the first research work for Android malware detection task that combines both analysis of decompiled source code and application permissions.
Editorials and Announcements
Call for Papers
- Special Issue on Social Networks Security
Submission Deadline: December 31, 2015
- Special Issue/Section: Emerging Embedded and Cyber Physical System Security Challenges and Innovations
Full Paper Regular Submission Due: February 1, 2016
- Open call for papers for TDSC
- The State of the Journal (March/April 2014)
- Editor's Note (May/June 2014)
- Editorial (January/February 2014)
- Editorial (January/February 2012)
Access recently published TDSC articles
Subscribe to the RSS feed of latest TDSC content added to the digital library.
Sign up for the Transactions Connection newsletter.
Swimming with Sharks: Security Roundtable