Kontaktujte nás | Jazyk: čeština English
dc.title | A perfect knife—Bulk decompilation and preprocessing tool | en |
dc.contributor.author | Dorotík, Ladislav | |
dc.contributor.author | Kincl, Jan | |
dc.contributor.author | Oulehla, Milan | |
dc.contributor.author | Šenkeřík, Roman | |
dc.contributor.author | Komínková Oplatková, Zuzana | |
dc.relation.ispartof | Lecture Notes in Electrical Engineering | |
dc.identifier.issn | 1876-1100 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-981998702-3 | |
dc.date.issued | 2024 | |
utb.relation.volume | 1081 | |
dc.citation.spage | 153 | |
dc.citation.epage | 164 | |
dc.event.title | International Conference on Advanced Engineering Theory and Applications, AETA 2022 | |
dc.event.location | Ho Chi Minh City | |
utb.event.state-en | Vietnam | |
utb.event.state-cs | Vietnam | |
dc.event.sdate | 2022-12-08 | |
dc.event.edate | 2022-12-10 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Springer Science and Business Media Deutschland GmbH | |
dc.identifier.doi | 10.1007/978-981-99-8703-0_13 | |
dc.relation.uri | https://link.springer.com/chapter/10.1007/978-981-99-8703-0_13 | |
dc.subject | Android malware | en |
dc.subject | APK | en |
dc.subject | bulk decompilation | en |
dc.subject | dataset preprocessing | en |
dc.description.abstract | Due to its vast popularity, the Android operating system has quickly become the main target of mobile malware creators. Consequently, there is a huge need for intensive efforts in the research of Android malware applications to identify malware features and thus be able to create an efficient method for malware detection. One of the main issues related to malware research is obtaining reliable datasets. Malware datasets could be obtained from various sources. Not only that they can tally up to thousands of individual applications, but also can contain damaged, corrupted, or otherwise invalid files. A large number of applications in a dataset is nearly impossible to be processed manually, invalid files can also jeopardize the process of analysis. For the results to be reproducible there needs to be a way how to specify which dataset was used and that it contained only valid files. This work introduces a tool, Perfect Knife, created by our research team for automatised decompilation, dataset validation, unification, and preparation for further research purposes. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1011948 | |
utb.identifier.scopus | 2-s2.0-85187794403 | |
utb.source | d-scopus | |
dc.date.accessioned | 2024-04-17T13:13:00Z | |
dc.date.available | 2024-04-17T13:13:00Z | |
utb.contributor.internalauthor | Dorotík, Ladislav | |
utb.contributor.internalauthor | Kincl, Jan | |
utb.contributor.internalauthor | Oulehla, Milan | |
utb.contributor.internalauthor | Šenkeřík, Roman | |
utb.contributor.internalauthor | Komínková Oplatková, Zuzana | |
utb.fulltext.sponsorship | This work was supported by Internal Grant Agency of Tomas Bata University in Zlin, grant No.: IGA/CebiaTech/2022/007. | |
utb.scopus.affiliation | Tomas Bata University in Zlin, Faculty of Applied Informatics, Nam. T. G. Masaryka 5555, Zlin, 76001, Czech Republic | |
utb.fulltext.projects | IGA/CebiaTech/2022/007 |
Soubory | Velikost | Formát | Zobrazit |
---|---|---|---|
K tomuto záznamu nejsou připojeny žádné soubory. |