Hachirou18 commited on
Commit
4059a8e
·
verified ·
1 Parent(s): 29ea486

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +34 -1
README.md CHANGED
@@ -21,4 +21,37 @@ metrics:
21
  - accuracy
22
  base_model:
23
  - microsoft/codebert-base
24
- ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
21
  - accuracy
22
  base_model:
23
  - microsoft/codebert-base
24
+ ---
25
+
26
+ # Android Malware Detector (MobSF Companion)
27
+
28
+ ## Model description
29
+ This AI model classifies Android APKs as **benign** or **malicious** (optionally by family) using features extracted during analysis with MobSF.
30
+ Its goal is to complement MobSF reports with a reproducible ML score/decision to support triage prioritization and CI/CD automation.
31
+
32
+ ## Intended use
33
+
34
+ ### Primary intended uses
35
+ - Enrich the MobSF pipeline: consume analysis features (permissions) and produce a risk score.
36
+ - Research/academia: benchmarking Android malware detection models.
37
+
38
+ ### Out-of-scope uses
39
+ - It is not a real-time on-device antivirus.
40
+ - It does not replace manual analysis, reversing, or signature verification.
41
+ - It should not be used as the sole criterion for punitive actions (e.g., bans) without review.
42
+
43
+ ## How to use (with MobSF)
44
+ MobSF can be automated via its REST API to upload, scan, and retrieve reports, which makes it possible to integrate this model as a post-scan step.
45
+
46
+ ### Minimal pipeline (conceptual)
47
+ 1. Run analysis in MobSF (API).
48
+ 2. Retrieve `report.json` (or another artifact).
49
+ 3. Extract/transform features into the format expected by the model.
50
+ 4. Run inference with the model and attach the result back into the workflow (CI/CD, dashboard, etc.).
51
+
52
+ ### Example code (pseudo)
53
+ ```python
54
+ # Pseudocode: replace with your actual implementation.
55
+ # 1) Call MobSF API -> get report_json
56
+ # 2) features = feature_extractor(report_json)
57
+ # 3) y_hat = model.predict(features)