Research Article
An Android Malware Detection Model Based on DT-SVM
Table 2
Feature simplification mapping.
| Identifier | Description | Opcode |
| G | Fetching data | aget—iget—sget—aget-wide—aget-object—aget-boolean—aget-byte—aget-char | P | Storing data | aput—iput—sput—aput-wide—aput-object—aput-boolean—aput-byte—aput-char | V | Method call | invoke-virtual—invoke-super—invoke-direct—invoke-static | I | Judgement | if-eq—if-ne—if-lt—if-ge—if-gt—if-le—if-eqz—if-nez—if-ltz—if-ltz—if-gez—if-gtz—if-lez | J | Goto | goto—goto/16—goto/32 | R | Return | return—return-void—return-wide—return-object | M | Move | move—move-wide—move-object—move-result—move-exception | C | Compare | cmpl-float— cmpg-float— cmpl-double— cmpg-double—cmp-long |
|
|