@inproceedings{f2c3ddf67ec5430b8bc53902ec6ee4b4,
title = "Identifying Applications' State via System Calls Activity: A Pipeline Approach",
abstract = "Android is the most widespread smartphone operating system. Its popularity attracted attackers to develop all sorts of malicious applications. On the defense side, much research has been done toward identifying Android applications type and state based on their system-level behavior. Recent research has shown that some behavioral features linked to user interaction are strongly correlated with the malice of apps. Guided by these insights, we designed a Machine Learning (ML) technique to detect whether an application is currently running in the foreground or not. The technique is aimed at boosting the accuracy of behavioral malware detection by providing informative priors or con metadata on app state to malware identification models. We report that a structured ML pipeline that identifies the app prior to detecting its mode can achieve substantially higher accuracy than direct mode identification.",
keywords = "Android OS, Background, Foreground, Machine Learning, Malware, Process, System Calls",
author = "Fatema Maasmi and Martina Morcos and {Al Hamadi}, Hussam and Ernesto Damiani",
note = "Publisher Copyright: {\textcopyright} 2021 IEEE.; 28th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2021 ; Conference date: 28-11-2021 Through 01-12-2021",
year = "2021",
doi = "10.1109/ICECS53924.2021.9665597",
language = "British English",
series = "2021 28th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2021 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2021 28th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2021 - Proceedings",
address = "United States",
}