EconPapers    
Economics at your fingertips  
 

LEMSOFT: Leveraging Extraction Method and Soft Voting for Android Malware Detection

Qiang Han, Zhichao Shi, Yao Li () and Tao Zhang
Additional contact information
Qiang Han: School of Computer Science and Engineering, North Minzu University, No. 204, Minzu South Street, Yinchuan 750021, China
Zhichao Shi: School of Computer Science and Engineering, North Minzu University, No. 204, Minzu South Street, Yinchuan 750021, China
Yao Li: School of Computer Science and Engineering, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macao SAR 999078, China
Tao Zhang: School of Computer Science and Engineering, Macau University of Science and Technology, Avenida Wai Long, Taipa, Macao SAR 999078, China

Mathematics, 2025, vol. 13, issue 21, 1-19

Abstract: The pervasive spread of Android malware poses significant threats to users and systems worldwide. In most existing studies, differences in feature importance are often overlooked, and the calculation of feature weights is conducted independently of the classification model. In this paper, we propose an Android malware detection method, L everaging E xtraction M ethod and Soft Voting classification (LEMSOFT). This approach includes a novel preprocessing module, lexical occurrence ratio-based filtering (LORF), and an improved Soft Voting mechanism optimized through genetic algorithms. We introduce LORF to evaluate and enhance the significance of permissions, API calls, and opcodes. Each type of feature is then independently classified using tailored machine learning models. To integrate the outputs of these classifiers, this paper proposes an innovative soft voting mechanism that improves prediction accuracy for encountered applications by assigning weights through a genetic algorithm. Our solution outperforms the baseline methods we studied, as evidenced by the evaluation of 5560 malicious and 8340 benign applications, with an average accuracy of 99.89%. The efficacy of our methodology is demonstrated through extensive experiments, showcasing significant improvements in detection rates compared to state-of-the-art (SOTA) methods.

Keywords: Android malware; feature selection; machine learning; static detection; soft voting (search for similar items in EconPapers)
JEL-codes: C (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2227-7390/13/21/3569/pdf (application/pdf)
https://www.mdpi.com/2227-7390/13/21/3569/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jmathe:v:13:y:2025:i:21:p:3569-:d:1789278

Access Statistics for this article

Mathematics is currently edited by Ms. Emma He

More articles in Mathematics from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-11-07
Handle: RePEc:gam:jmathe:v:13:y:2025:i:21:p:3569-:d:1789278