This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1266
M0DROID Dataset
External Dataset
External Data Source
AZSecure Data
Unknown
Unknown
55 (lowest rank is 55)

Category & Restrictions

Other
malware, cyber attack, intrusion detection, cyber defense, wireless, network data, mobile software
Unrestricted
true

Description


This dataset contains signatures generated from many Android APKs, and can be used separately from the detection engine.

This dataset comes bundled with the M0DROID mobile malware analysis tool, which is designed to detect Android malware using signatures derived from system call requests of individual Android APKs.      The data was generated using real Android APKs as input, and signatures as output.    The dataset comprises these signatures. The tool to generate the signatures is designed by the authors, and is called the server analyzer.

Additional Details

5.8MB
false
Unknown
cybercrime, server, smartphone, malware, android, inferlink corporation, m0droid dataset, alphabet inc, mobile security, google software, external data source, malware analysis, mobile malware, servers, malware by platform, 1266, exploit, google acquisitions