Research Article

Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods

Table 2

Four paths of feature extraction in our malware-detecting scheme.

PathDescriptionComplexityConditions

Com+ featureA classical presentation of Apk fileLowDecompilable, nonobfuscation
Function call graphA structural-level feature containing the invoking relationshipsSuper highDecompilable
System call featureA Linux kernel level dynamic feature suited for most Android versionsHighApps earlier than Android 4.1
Privacy usageAn Android-specified dynamic feature indicating privacy leakage based on TaintDroidHighApps of Android 4.1 or later