This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.


Android Malware Genome Project
External Dataset
External Data Source
Yajin Zhou, Xuxian Jiang
56 (lowest rank is 56)

Category & Restrictions

malware, cyber attack, wireless, network data, mobile software


In this project, we focus on the Android platform and aim to systematize or characterize existing Android malware.

This project has managed to collect more than 1,200 malware samples that cover the majority of existing Android malware families, ranging from their debut in August 2010 to recent ones in October 2011. In addition, the samples are systematically characterized them from their various aspects, including their installation methods, activation mechanisms as well as the nature of carried malicious payloads. The characterization and a subsequent evolution-based study of representative families reveal that they are evolving rapidly to circumvent the detection from existing mobile anti-virus software. Based on the evaluation with four representative mobile security software, the experiments in November, 2011 show that the best case detects 79.6% of them while the worst case detects only 20.2% in the dataset. These results clearly call for the need to better develop next-generation anti-mobile-malware solution

Additional Details

android, malware, project, 1340, android malware genome project, genome, inferlink, source, corporation, external, external data source, inferlink corporation, existing, platform, systematize, focus, aim, characterize, mobile, 2011, samples, anti, based, detects, software, families, representative, installation, managed, evolving, security, malicious, characterization, subsequent, characterized, dataset, carried, detection, call, nature, ranging, rapidly, evolution, debut, october, august, including, generation, addition, mechanisms, majority, solution, evaluation, cover, reveal, november, develop, 200, systematically, virus, 2010, aspects, experiments, methods, payloads, other, study, collect, activation, worst, circumvent