Skip to content
/ Z2F Public
forked from Jully-xiaoman/Z2F

Z2F: Heterogeneous Graph-Based Android Malware Detection

License

Notifications You must be signed in to change notification settings

S0urc-3/Z2F

 
 

Repository files navigation

Z2F

Z2F: Heterogeneous Graph-Based Android Malware Detection

Floder:decompile

Step1:using apktoo.jar and apktool.bat to install apktool to decompile Android packages; Step2:using decompile.py to batch decompile Android packages.

Floder:filter_samples

using check_empty.py,check_smali.py,delete_empty.py and filter_samples.py to check and delete all waste samples;

Floder:Android features extraction

After decompilation, we get a folder for each Android application; Step1:using extract_api.py to extract api feature; Step12:using extract_interface.py to extract interface feature; ...

Floder:features_data

We use JSON format to store the extracted raw data,api data not uploaded due to storage capacity;

file:hadmard_normalize.py

Refer to the paper 's original formula (1) ,formula (2);

model

The model is based on HAN

embedding

the samples's data after Z2F

About

Z2F: Heterogeneous Graph-Based Android Malware Detection

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 98.4%
  • Batchfile 1.6%