This repository follows the paper "Breaking the Structure of MaMaDroid". It contains extended version of the results of the experiments on MaMaDroid.
There are three results' folders - Detection rate, DRR and Model Reliability. Each folder depict a different case, which correlates to a different sub-folder:
- Original apps
- Random STB attack
- Full Statisticl STB attack
- Black Hole STB attack
Each sub-folder contains 5 CV of the results of the original models and non-mentioned-in-the-original-paper models. The originals are depicted as _former_algs_CVnumber and the new ones only by the CVnumber.
The attached scripts run the MaMaDroid2.0 detection machine against the StB and MB attacks.
The attack folder includes the template for the StB attack.
If you use this repository, please cite it as: Berger, H., Dvir, A., Mariconti, E., & Hajaj, C. (2023). Breaking the structure of MaMaDroid. Expert Systems with Applications, 120429. Elsevier.
BibTeX format:
@article{berger2023breaking,
title={Breaking the structure of MaMaDroid},
author={Berger, Harel and Dvir, Amit and Mariconti, Enrico and Hajaj, Chen},
journal={Expert Systems with Applications},
pages={120429},
year={2023},
publisher={Elsevier}
}