Master of Science (MS)
Fabio Di Troia
In resource constrained devices, malware detection is typically based on offline analysis using emulation. In previous work it has been claimed that such emulation fails for a significant percentage of Android malware because well-designed malware detects that the code is being emulated. An alternative to emulation is malware analysis based on code that is executing on an actual Android device. In this research, we collect features from a corpus of Android malware using both emulation and on-phone instrumentation. We train machine learning models based on emulated features and also train models based on features collected via instrumentation, and we compare the results obtained in these two cases.
Sinha, Anukriti, "Emulation vs Instrumentation for Android Malware Detection" (2019). Master's Projects. 700.
Available for download on Wednesday, May 20, 2020