Research Article
Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods
Table 2
Four paths of feature extraction in our malware-detecting scheme.
| Path | Description | Complexity | Conditions |
| Com+ feature | A classical presentation of Apk file | Low | Decompilable, nonobfuscation | Function call graph | A structural-level feature containing the invoking relationships | Super high | Decompilable | System call feature | A Linux kernel level dynamic feature suited for most Android versions | High | Apps earlier than Android 4.1 | Privacy usage | An Android-specified dynamic feature indicating privacy leakage based on TaintDroid | High | Apps of Android 4.1 or later |
|
|