Research Article
Linear SVM-Based Android Malware Detection for Reliable IoT Services
Table 3
Features of malware to be analyzed.
| Malware category | Malware Name | Features |
| Trojan | Zitmo | Disguises as an Android security application | DroidKungFu | Leaks personal information | Opfake | Disguises as a game application (performance degradation) | FakeInst | Disguises as a game application (performance degradation) | Goldream | Disguises as a game/animation application | LightDD | Disguise as an adult application |
| Spyware | Geimini | Carries out a backdoor function | Adrd.AQ | Carries out a backdoor function | Snake | Disguises as a game to leak information | Pjapps | Adds malicious functions to a normal app. |
| Root permission acquisition (exploit) | Rootor.BT | Makes terminal rooting (security dismantling) | Basebridge | Acquires root permissions and then communicates with an external server |
| Installer (dropper) | SMSHider | Guides to install malware through SMS | Anserver | Downloads other malware |
|
|