Intelligent Mobile Malware Detection
ISBN: 9781003121510
Platform/Publisher: Taylor & Francis / CRC Press
Digital rights: Users: Unlimited; Printing: Unlimited; Download: Unlimited



The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The text then presents four different system call-based dynamic Android malware detection mechanisms using graph centrality measures, graph signal processing and graph convolutional networks. Further, it shows how most of the Android malware can be detected by checking the presence of a unique subsequence of system calls in its system call sequence. All the malware detection mechanisms presented in the book are based on the authors' recent research. The experiments are conducted with the latest Android malware samples and the malware samples are collected from public repositories. The source codes are also provided for easy implementation of the mechanisms. This book will be highly useful to Android malware researchers, developers, students and cyber security professionals to explore and build defense mechanisms against the ever-evolving Android malware.


Tony Thomas is an associate professor at the Indian Institute of Information Technology and Management, Kerala (IIITM-K), India. He earned his master's and Ph.D degrees from IIT Kanpur. After completing his PhD, he pursued postdoctoral research at the Korea Advanced Institute of Science and Technology, Daejeon, South Korea. He later worked as a member of the research staff at the General Motors Research Lab, Bangalore, India, and the School of Computer Engineering, Nanyang Technological University, Singapore. His current research interests include malware analysis, biometrics, cryptography, machine learning, cyber threat prediction and visualization, digital watermarking, multimedia security and digital forensics.

Roopak Surendran is currently pursuing his PhD in the area of Android malware analysis at the Indian Institute of Information Technology and Management-Kerala (IIITM-K). Before joining his PhD program, he completed his MPhil degree in computer science with a specialization in cyber security from IIITM-K. He has published several research papers related to Android malware analysis and phishing detection. His research interests include malware analysis and phishing detection.

Teenu S. John holds an MTech degree in computer science with specialization in data security from TocH Institute of Science and Technology, part of the Cochin University of Science and Technology, Kerala, India and a BTech degree in Information Technology from the College of Engineering Perumon, also part of the Cochin University of Science and Technology, Kerala, India. She is currently doing her PhD in detecting adversarial attacks in Android malware detection at the Indian Institute of Information Technology and Management, Kerala (IIITM-K). Her research interests include malware analysis, machine learning for cybersecurity, data analytics and cyber threat detection.

Mamoun Alazab is an associate professor at the College of Engineering, IT and Environment at Charles Darwin University, Australia. Dr. Alazab's research is multidisciplinary and focuses on cybersecurity, which includes current and emerging issues in cyber environments such as cyber-physical systems, specifically cybercrime detection and prevention. His research focuses on human behavior, computational analysis like AI, machine learning, including deep learning for access control and biometrics, and human information processing concerns in security and privacy. He has published more than 150 research papers in many international journals and conferences. His research over the years has contributed to the development of several successful secure commercial systems in the areas of secure network systems, security tools, AI security, secure mobile systems, as well as cryptographic, cyber-physical systems for security, and applications where the devices are often lightweight.

hidden image for function call