{"id":"https://openalex.org/W4319309618","doi":"https://doi.org/10.1109/skima57145.2022.10029504","title":"On Impact of Adversarial Evasion Attacks on ML-based Android Malware Classifier Trained on Hybrid Features","display_name":"On Impact of Adversarial Evasion Attacks on ML-based Android Malware Classifier Trained on Hybrid Features","publication_year":2022,"publication_date":"2022-12-02","ids":{"openalex":"https://openalex.org/W4319309618","doi":"https://doi.org/10.1109/skima57145.2022.10029504"},"language":"en","primary_location":{"id":"doi:10.1109/skima57145.2022.10029504","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/skima57145.2022.10029504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059307518","display_name":"Husnain Rafiq","orcid":"https://orcid.org/0000-0002-3178-4026"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Husnain Rafiq","raw_affiliation_strings":["Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","institution_ids":["https://openalex.org/I32394136"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041150133","display_name":"Nauman Aslam","orcid":"https://orcid.org/0000-0002-9500-3970"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Nauman Aslam","raw_affiliation_strings":["Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","institution_ids":["https://openalex.org/I32394136"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060034165","display_name":"Biju Issac","orcid":"https://orcid.org/0000-0002-1109-8715"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Biju Issac","raw_affiliation_strings":["Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","institution_ids":["https://openalex.org/I32394136"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020356302","display_name":"Rizwan Hamid Randhawa","orcid":"https://orcid.org/0000-0003-1563-5239"},"institutions":[{"id":"https://openalex.org/I32394136","display_name":"Northumbria University","ror":"https://ror.org/049e6bc10","country_code":"GB","type":"education","lineage":["https://openalex.org/I32394136"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Rizwan Hamid Randhawa","raw_affiliation_strings":["Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Northumbria University,Department of Computer and Information Sciences,Newcastle,United Kingdom","institution_ids":["https://openalex.org/I32394136"]},{"raw_affiliation_string":"Department of Computer and Information Sciences, Northumbria University, Newcastle, United Kingdom","institution_ids":["https://openalex.org/I32394136"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5059307518"],"corresponding_institution_ids":["https://openalex.org/I32394136"],"apc_list":null,"apc_paid":null,"fwci":0.2976,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.53848078,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"216","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.806515634059906},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7850687503814697},{"id":"https://openalex.org/keywords/android-malware","display_name":"Android malware","score":0.7546147108078003},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7385084629058838},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.7049339413642883},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.6421090364456177},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.6331776976585388},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5716124773025513},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47195568680763245},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19324028491973877}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.806515634059906},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7850687503814697},{"id":"https://openalex.org/C2989133298","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android malware","level":3,"score":0.7546147108078003},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7385084629058838},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.7049339413642883},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6421090364456177},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.6331776976585388},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5716124773025513},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47195568680763245},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19324028491973877}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/skima57145.2022.10029504","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/skima57145.2022.10029504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 14th International Conference on Software, Knowledge, Information Management and Applications (SKIMA)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/15167e90-bea6-438a-94dd-0edc155dec1f","is_oa":false,"landing_page_url":"https://research.edgehill.ac.uk/en/publications/15167e90-bea6-438a-94dd-0edc155dec1f","pdf_url":null,"source":{"id":"https://openalex.org/S4306402462","display_name":"Edge Hill University Research Information Repository (Edge Hill University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I165525304","host_organization_name":"Edge Hill University","host_organization_lineage":["https://openalex.org/I165525304"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"RAFIQ, HUSNAIN, Aslam, N, Issac, B & Randhawa, R H 2022, On Impact of Adversarial Evasion Attacks on ML-based Android Malware Classifier Trained on Hybrid Features. in 14th International Conference on Software, Knowledge, Information Management and Applications (SKIMA). International Conference on Software, Knowledge Information, Industrial Management and Applications, SKIMA, vol. 2022-December, pp. 216-221, 14th International Conference on Software, Knowledge, Information Management and Applications, Phnom Penh, Cambodia, 2/12/22. https://doi.org/10.1109/SKIMA57145.2022.10029504","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G4094520730","display_name":null,"funder_award_id":"EP/T009543/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1535984709","https://openalex.org/W2005299943","https://openalex.org/W2038296020","https://openalex.org/W2047237187","https://openalex.org/W2101234009","https://openalex.org/W2182729154","https://openalex.org/W2243397390","https://openalex.org/W2403995870","https://openalex.org/W2432142698","https://openalex.org/W2744095836","https://openalex.org/W2758551931","https://openalex.org/W2772265308","https://openalex.org/W2772683029","https://openalex.org/W2783327762","https://openalex.org/W2882132993","https://openalex.org/W2947123069","https://openalex.org/W3007481080","https://openalex.org/W3015001695","https://openalex.org/W3157371529","https://openalex.org/W3177627266","https://openalex.org/W3217564040","https://openalex.org/W4226504147","https://openalex.org/W4247200422","https://openalex.org/W4283220304","https://openalex.org/W4285604261","https://openalex.org/W4289792797","https://openalex.org/W4295803779","https://openalex.org/W6637162671","https://openalex.org/W6717848421","https://openalex.org/W6725672702","https://openalex.org/W6774348459"],"related_works":["https://openalex.org/W2782775281","https://openalex.org/W2560361988","https://openalex.org/W2507113366","https://openalex.org/W2591124010","https://openalex.org/W3200508744","https://openalex.org/W3025122950","https://openalex.org/W2895504842","https://openalex.org/W4281384336","https://openalex.org/W2717179875","https://openalex.org/W4249118297"],"abstract_inverted_index":{"Due":[0],"to":[1,46,56,66,71,120,170,179],"the":[2,9,20,32,35,63,68,73,102,136,139,181],"widespread":[3],"usage":[4],"of":[5,22,118,126,138,183],"Android-based":[6],"smartphones":[7],"in":[8,27,31,43,142,188],"current":[10],"era,":[11],"Android":[12,48,90,131,185],"malware":[13,91,128,165,186],"has":[14,38],"become":[15],"a":[16,25,40,86,98,114,123],"significant":[17],"concern.":[18],"From":[19],"perspective":[21],"t":[23],"he":[24],"dvances":[26],"machine":[28],"learning-based":[29],"approaches":[30],"previous":[33],"decade,":[34],"research":[36],"community":[37],"shown":[39],"dominant":[41],"interest":[42],"applying":[44],"these":[45,51],"counter":[47],"malware.":[49],"However,":[50],"ML-based":[52,164,184],"classifiers":[53,166,187],"are":[54,167],"vulnerable":[55,169],"attacks.":[57,173],"An":[58],"attacker":[59],"can":[60],"deliberately":[61],"fabricate":[62],"input":[64],"application":[65],"force":[67],"classification":[69],"algorithm":[70],"produce":[72],"desired":[74],"output":[75],"(evasion":[76],"attack).":[77],"In":[78],"this":[79],"study,":[80],"first,":[81],"w":[82],"e":[83],"propose":[84,176],"HybridDroid,":[85],"n":[87,95],"M":[88],"L-based":[89],"classifier":[92],"trained":[93],"o":[94],"hybrid":[96],"features":[97],"nd":[99],"optimized":[100],"using":[101],"tree-based":[103],"pipeline":[104],"optimization":[105],"technique":[106],"(TPOT).":[107],"Our":[108,160],"experiments":[109,161],"show":[110],"that":[111,163],"HybriDroid":[112],"achieves":[113],"remarkable":[115],"detection":[116],"accuracy":[117],"up":[119],"99.2%":[121],"on":[122,158],"balanced":[124],"excerpt":[125],"36,000":[127],"and":[129,152],"benign":[130],"apps.":[132],"Secondly,":[133],"we":[134,175],"explore":[135],"effectiveness":[137],"proposed":[140],"model":[141],"adversarial":[143,171,189],"environments.":[144],"We":[145],"apply":[146],"mimicry":[147],"attacks,":[148],"feature":[149,153],"removal":[150,154],"attacks":[151,157],"with":[155],"injection":[156],"HybriDroid.":[159],"reveal":[162],"highly":[168],"evasion":[172],"Finally,":[174],"future":[177],"directions":[178],"harden":[180],"security":[182],"settings.":[190]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-26T08:31:28.666265","created_date":"2025-10-10T00:00:00"}
