Andro-Profiler‎ > ‎

download-profiler

Andro-Profiler dataset


This is Huy Kang Kim, an associate professor in Graduate School of Information Security in Korea University, South Korea.


Thanks for your interests in our malware samples.


We provide our malware dataset only for research purposes.

We note that you are not allowed to distribute the dataset to others without our permission.


Before downloading it, please read the following instructions carefully.



 (1) The most of samples are zipped using 7zip.

 (2) Then send e-mail to cenda at korea.ac.kr to get the decompress password. (Please identify your name, affiliation and purpose.) 

 (3) Please use these samples at your own risk.



Download links are as follows:


Samples used in Andro-Profiler (Detecting and classifying method based on similarity matching of Android malware behavior with profile." SpringerPlus 5.1 (2016): 1) 


  • 8840 benign samples from Google Play  

https://www.dropbox.com/s/c8q87dfhin18v2t/Andro_profiler_Google_8840_140320.7z?dl=0


  • 702 malware samples (We add some more samples than used in the paper (643 samples), you can find all descriptions in the excel file in 7zip file.) 

https://www.dropbox.com/s/5c1zoqxcdd1eb41/Malware_for_Andro_Profiler_702_131224.7z?dl=0


  • 225 samples misclassified by Andro-Profiler (mentioned in Page 20 of the paper) 

https://www.dropbox.com/s/ma82vsslwfmddh0/Andro_profiler_misclassified_225_140314.7z?dl=0


  • Additional 91 Zero-day samples (described in Effectiveness of detecting 0‐day malware section of the paper)

https://www.dropbox.com/s/ts0kaz4nacvdseu/Zeroday_Samples_91_20140318.7z?dl=0


If you want to perform comparative analysis with our older version of publication appeared in SIMPLEX workshop 2014 (Jang, Jae-wook, et al. "Andro-profiler: anti-malware system based on behavior profiling of mobile malware." Proceedings of the companion publication of the 23rd international conference on World wide web companion. International World Wide Web Conferences Steering Committee, 2014.) , then use these following two dataset. 


  • Benign_apps 350

https://www.dropbox.com/s/u6mpunnltqjsm36/benign_apps_350.7z?dl=0


  • Malware apps 709

https://www.dropbox.com/s/c0uymsvrr8q8asn/malware_apps_709.7z?dl=0



The activation periods for all above dataset is 30 days, then before expired, you might download our dataset.


If you use our samples for your experiment, please refer our paper.

Jang, Jae-wook, et al. "Detecting and classifying method based on similarity matching of Android malware behavior with profile." SpringerPlus 5.1 (2016): 1.


See more details at  

http://ocslab.hksecurity.net/andro-profiler


Also, you can find another malware dataset from our web site. 

Mobile 

Windows 


Best regards, 

Huy Kang Kim 


Comments