DISSERTATION

Static and Dynamic Analysis for Android Malware Detection

Abstract

Static analysis relies on features extracted without executing code, while dynamic analysis extracts features based on code execution (or emulation). In general, static analysis is more e cient, while static analysis is often more informative, particularly in cases of highly obfuscated code. Static analysis of an Android application can rely on features extracted from the manifest le or the Java bytecode, while dynamic analysis of Android applications can deal with features involving dynamic code loading and system calls that are collected while the application is running. In this research, we analyzed the e ectiveness of combining static and dynamic features for detecting Android malware using machine learning techniques . We also carefully analyze the robustness of our scoring technique.

Keywords:
Bytecode Static analysis Computer science Emulation Android (operating system) Machine code Static program analysis Dynamic program analysis Android malware Malware Malware analysis Java Operating system Lexical analysis Robustness (evolution) Opcode Program analysis Embedded system Programming language Artificial intelligence Software

Metrics

17
Cited By
0.00
FWCI (Field Weighted Citation Impact)
10
Refs
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems
Software Testing and Debugging Techniques
Physical Sciences →  Computer Science →  Software
© 2026 ScienceGate Book Chapters — All rights reserved.