NyerAndroidMalware / README.md
Hachirou18's picture
Update README.md
dc27722 verified
---
license: apache-2.0
tags:
- android
- malware-detection
- cybersecurity
- static-analysis
- mobile-security
- mobsf
- classification
- security
pipeline_tag: text-classification
metrics:
- f1
- precision
- recall
- accuracy
base_model:
- microsoft/codebert-base
---
# Android Malware Detector (MobSF Companion)
## Model description
This AI model classifies Android APKs as **benign** or **malicious** using features extracted during analysis with MobSF.
Its goal is to complement MobSF reports with a reproducible ML score/decision to support triage prioritization and CI/CD automation.
## Intended use
### Primary intended uses
- Enrich the MobSF pipeline: consume analysis features (permissions) and produce a risk score.
- Research/academia: benchmarking Android malware detection models.
### Out-of-scope uses
- It is not a real-time on-device antivirus.
- It does not replace manual analysis, reversing, or signature verification.
- It should not be used as the sole criterion for punitive actions (e.g., bans) without review.
## How to use (with MobSF)
MobSF can be automated via its REST API to upload, scan, and retrieve reports, which makes it possible to integrate this model as a post-scan step.
### Minimal pipeline (conceptual)
1. Run analysis in MobSF (API).
2. Retrieve `report.json` (or another artifact).
3. Extract/transform features into the format expected by the model.
4. Run inference with the model and attach the result back into the workflow (CI/CD, dashboard, etc.).
### USAGE API MOBSF
https://github.com/H4ch1rou/NyerAndroidMalwarePOC