Research Article
Linear SVM-Based Android Malware Detection for Reliable IoT Services
Table 3
Features of malware to be analyzed.
| | Malware category | Malware Name | Features |
| | Trojan | Zitmo | Disguises as an Android security application | | DroidKungFu | Leaks personal information | | Opfake | Disguises as a game application (performance degradation) | | FakeInst | Disguises as a game application (performance degradation) | | Goldream | Disguises as a game/animation application | | LightDD | Disguise as an adult application |
| | Spyware | Geimini | Carries out a backdoor function | | Adrd.AQ | Carries out a backdoor function | | Snake | Disguises as a game to leak information | | Pjapps | Adds malicious functions to a normal app. |
| | Root permission acquisition (exploit) | Rootor.BT | Makes terminal rooting (security dismantling) | | Basebridge | Acquires root permissions and then communicates with an external server |
| | Installer (dropper) | SMSHider | Guides to install malware through SMS | | Anserver | Downloads other malware |
|
|