--- license: apache-2.0 tags: - android - malware-detection - cybersecurity - static-analysis - mobile-security - mobsf - classification - security pipeline_tag: text-classification metrics: - f1 - precision - recall - accuracy base_model: - microsoft/codebert-base --- # Android Malware Detector (MobSF Companion) ## Model description This AI model classifies Android APKs as **benign** or **malicious** using features extracted during analysis with MobSF. Its goal is to complement MobSF reports with a reproducible ML score/decision to support triage prioritization and CI/CD automation. ## Intended use ### Primary intended uses - Enrich the MobSF pipeline: consume analysis features (permissions) and produce a risk score. - Research/academia: benchmarking Android malware detection models. ### Out-of-scope uses - It is not a real-time on-device antivirus. - It does not replace manual analysis, reversing, or signature verification. - It should not be used as the sole criterion for punitive actions (e.g., bans) without review. ## How to use (with MobSF) MobSF can be automated via its REST API to upload, scan, and retrieve reports, which makes it possible to integrate this model as a post-scan step. ### Minimal pipeline (conceptual) 1. Run analysis in MobSF (API). 2. Retrieve `report.json` (or another artifact). 3. Extract/transform features into the format expected by the model. 4. Run inference with the model and attach the result back into the workflow (CI/CD, dashboard, etc.). ### USAGE API MOBSF https://github.com/H4ch1rou/NyerAndroidMalwarePOC