Downloads


Click here to download the feature vectors extracted from the malicious/benign apps we analyzed

Experiments


You can find tabulated results of our experiments and interactive visualizations here.

Information


This page contains miscellaneous information about the datasets we used and the features we extracted from their apps

This website is dedicated to host figures, statistics, and data generated during our analysis and experimentation on the aforementioned Android malware datasets. Our primary objective from sharing this information is to provide (new) researchers--wishing to delve into the research field of Android malware analysis and detection--with a brief overview of the current trends adopted by Android malware and the methods that do (not) effectively manage to detect it. Using the information on this website, you should be able to reproduce our findings and, hopefully, build on it. If you find this website useful for your research, kindly consider citing our paper below. Please do not hesitate to contact us, if have any questions, concerns, or feedback about this website. Happy hunting.

@inproceedings{Salem:2018:PBL:3243218.3243222, author = {Salem, Aleieldin and Pretschner, Alexander}, title = {Poking the Bear: Lessons Learned from Probing Three Android Malware Datasets}, booktitle = {Proceedings of the 1st International Workshop on Advances in Mobile App Analysis}, year = {2018}, pages = {19--24}, url = {http://doi.acm.org/10.1145/3243218.3243222}, doi = {10.1145/3243218.3243222}, publisher = {ACM} }