Research Article

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining

Table 6

The FPR of 30 typical malware families of the dataset.

Family nameTPR/FPR (%)Family nameTPR/FPR (%)Family nameTPR/FPR (%)

DroidDream100/1.5RogueSPPush100/2Koodous100/0
DroidDreamLight100/1SndApps100/2Mobidash100/2.2
Geinimi100/1.4zHash100/0RansomBO100/0
jSMSHider100/0Dowgin100/3.8Svpeng100/0
Plankton100/1.3Edwin100/0Koler100/2.4
YZHC100/0Feiwo100/0Pletor100/0
Zsone100/0Gooligan100/2.5PornDroid100/2.3
Asroot100/0Kemoge100/0Charger100/3.7
Bgserv100/0Fakemart100/3Jisut100/0
KMin100/0Jifake100/3.1MazarBot100/0
Average1.1