{"id":"https://openalex.org/W7118647020","doi":"https://doi.org/10.1016/j.icte.2026.01.005","title":"Feature-driven static analysis for learning-based android malware detection: A review","display_name":"Feature-driven static analysis for learning-based android malware detection: A review","publication_year":2026,"publication_date":"2026-01-06","ids":{"openalex":"https://openalex.org/W7118647020","doi":"https://doi.org/10.1016/j.icte.2026.01.005"},"language":"en","primary_location":{"id":"doi:10.1016/j.icte.2026.01.005","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.icte.2026.01.005","pdf_url":null,"source":{"id":"https://openalex.org/S2898368220","display_name":"ICT Express","issn_l":"2405-9595","issn":["2405-9595"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICT Express","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1016/j.icte.2026.01.005","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114989287","display_name":"Sumesh Kharnotia","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sumesh Kharnotia","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0009-0007-9446-4891","affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5122181363","display_name":"Bhavna Arora","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bhavna Arora","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5042793059","display_name":"Ravdeep Kour","orcid":"https://orcid.org/0000-0003-0734-0959"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ravdeep Kour","raw_affiliation_strings":[],"raw_orcid":"https://orcid.org/0000-0003-0734-0959","affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5114989287"],"corresponding_institution_ids":[],"apc_list":{"value":1500,"currency":"USD","value_usd":1500},"apc_paid":{"value":1500,"currency":"USD","value_usd":1500},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.05342815,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"1","first_page":"186","last_page":"208"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.0010999999940395355,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.0007999999797903001,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.9261000156402588},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7980999946594238},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7626000046730042},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7218999862670898},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.5428000092506409},{"id":"https://openalex.org/keywords/malware-analysis","display_name":"Malware analysis","score":0.4429999887943268},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.384799987077713},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.3467999994754791}],"concepts":[{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.9261000156402588},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8012999892234802},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7980999946594238},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7626000046730042},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7218999862670898},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.5428000092506409},{"id":"https://openalex.org/C2779395397","wikidata":"https://www.wikidata.org/wiki/Q15731404","display_name":"Malware analysis","level":3,"score":0.4429999887943268},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.384799987077713},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3589000105857849},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35499998927116394},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.3467999994754791},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3278999924659729},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3181000053882599},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3001999855041504},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.2996000051498413},{"id":"https://openalex.org/C115168132","wikidata":"https://www.wikidata.org/wiki/Q55813","display_name":"Machine code","level":3,"score":0.2903999984264374},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.2872999906539917},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.27410000562667847},{"id":"https://openalex.org/C3017891749","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android application","level":3,"score":0.2623000144958496},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.2621000111103058},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C84525096","wikidata":"https://www.wikidata.org/wiki/Q3506050","display_name":"Cryptovirology","level":3,"score":0.25290000438690186}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1016/j.icte.2026.01.005","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.icte.2026.01.005","pdf_url":null,"source":{"id":"https://openalex.org/S2898368220","display_name":"ICT Express","issn_l":"2405-9595","issn":["2405-9595"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICT Express","raw_type":"journal-article"},{"id":"pmh:oai:DiVA.org:ltu-115913","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-115913","pdf_url":null,"source":{"id":"https://openalex.org/S7407055297","display_name":"Epubl LTU","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:001b179f00644a03a0a20853740f6347","is_oa":true,"landing_page_url":"https://doaj.org/article/001b179f00644a03a0a20853740f6347","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ICT Express, Vol 12, Iss 1, Pp 186-208 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1016/j.icte.2026.01.005","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.icte.2026.01.005","pdf_url":null,"source":{"id":"https://openalex.org/S2898368220","display_name":"ICT Express","issn_l":"2405-9595","issn":["2405-9595"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICT Express","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W3024340288","https://openalex.org/W3098095456","https://openalex.org/W3099702369","https://openalex.org/W3135916744","https://openalex.org/W3145971023","https://openalex.org/W3182600083","https://openalex.org/W3199988967","https://openalex.org/W3200468661","https://openalex.org/W3210837816","https://openalex.org/W3215345317","https://openalex.org/W3216588331","https://openalex.org/W4205521168","https://openalex.org/W4205876068","https://openalex.org/W4210285013","https://openalex.org/W4210816515","https://openalex.org/W4211249255","https://openalex.org/W4214575608","https://openalex.org/W4220895831","https://openalex.org/W4221090377","https://openalex.org/W4226034576","https://openalex.org/W4282549944","https://openalex.org/W4285059789","https://openalex.org/W4288780798","https://openalex.org/W4296022976","https://openalex.org/W4296472209","https://openalex.org/W4306827119","https://openalex.org/W4309490546","https://openalex.org/W4312008223","https://openalex.org/W4312334973","https://openalex.org/W4313419126","https://openalex.org/W4318384306","https://openalex.org/W4319225041","https://openalex.org/W4320009754","https://openalex.org/W4321021238","https://openalex.org/W4321612103","https://openalex.org/W4367603304","https://openalex.org/W4376109301","https://openalex.org/W4380716409","https://openalex.org/W4381736097","https://openalex.org/W4385977738","https://openalex.org/W4386074205","https://openalex.org/W4386852161","https://openalex.org/W4387063777","https://openalex.org/W4387490476","https://openalex.org/W4387546243","https://openalex.org/W4392114371","https://openalex.org/W4392367578","https://openalex.org/W4392696582","https://openalex.org/W4392718672","https://openalex.org/W4393071176","https://openalex.org/W4403583637","https://openalex.org/W4404992535","https://openalex.org/W4405141762","https://openalex.org/W4405916916","https://openalex.org/W4406085105","https://openalex.org/W4407693851","https://openalex.org/W4408437795","https://openalex.org/W4408777640","https://openalex.org/W4409280760","https://openalex.org/W4409488272","https://openalex.org/W4410759345"],"related_works":[],"abstract_inverted_index":{"The":[0],"extensive":[1],"embrace":[2],"of":[3,22,82,95],"Android":[4,96],"has":[5],"amplified":[6],"malware":[7],"risks,":[8],"resulting":[9],"in":[10,71],"a":[11],"need":[12],"for":[13,79],"better":[14],"detection":[15,83,93],"methods.":[16],"This":[17],"article":[18],"investigates":[19],"the":[20,43,64],"area":[21],"static":[23,74],"analysis,":[24,75],"which":[25],"analyses":[26],"applications":[27],"without":[28],"execution":[29],"by":[30,62],"examining":[31],"code":[32],"and":[33,49,56,67,76,89],"manifest":[34],"files.":[35],"We":[36,60],"focus":[37],"on":[38,52],"studies":[39,72],"from":[40],"2022\u20132025,":[41],"regarding":[42,73],"feature":[44,47],"extraction,":[45],"datasets,":[46],"selection,":[48],"approaches":[50],"based":[51],"Machine":[53],"Learning":[54,58],"(ML)":[55],"Deep":[57],"(DL).":[59],"conclude":[61],"defining":[63],"major":[65],"limitations":[66],"research":[68],"gaps":[69],"presented":[70],"many":[77],"insights":[78],"potential":[80],"development":[81],"models":[84],"that":[85],"are":[86],"efficient,":[87],"accurate,":[88],"lightweight":[90],"to":[91],"improve":[92],"patterns":[94],"malware.":[97]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-01-08T00:00:00"}
