Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components
Description
These files are the experiment data of AMCDroid.
(1) is the dataset used in the experiment (to the best of our knowledge, MYST dataset is the only one annotated with locations of malicious classes);
(2) is the malicious component detection result of the running example;
(3) to (6) are the experiment data in RQ1 to RQ4;
(7) is the malicious component detection result of Roaming Mantis;
(8) is the malicious component detection result in internal validity.
You can request access to the source code by clicking AMCDroid.
Files
Files
(65.8 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:215c48e7009de2768c5880d7b3aded22
|
1.6 MB | Download |
|
md5:2061810594ab5aed4023a769639dbe30
|
41.5 MB | Download |
|
md5:5aa290f53e6a05ef3a88c9cd7eae514e
|
3.1 MB | Download |
|
md5:a37fb967c7c87d155bbfc8f7f34942db
|
4.8 MB | Download |
|
md5:4b55d9694893fb9050eae35f1ad995c3
|
363.9 kB | Download |
|
md5:7107b9b6af273f25c20ae8cd6211b047
|
9.3 MB | Download |
|
md5:91deb6e59d9521abd9b1dfa8de26c587
|
460.9 kB | Download |
|
md5:663796c97b906c6cb7ca51611e7308af
|
4.7 MB | Download |