Mobile Information Systems / 2018 / Article / Tab 3

Research Article

Detecting Android Malwares with High-Efficient Hybrid Analyzing Methods

Table 3

List of instruction categories and corresponding bit.

CategoryBit

nop1
move2
return3
monitor4
test5
new6
throw7
jump8
branch9
arrayop10
instanceop11
staticop12
invoke13
unop14
binop15