Sanamontre T.Visoottiviseth V.Ragkhitwetsagul C.Mahidol University2024-05-042024-05-042024-01-01Lecture Notes on Data Engineering and Communications Technologies Vol.202 (2024) , 238-25123674512https://repository.li.mahidol.ac.th/handle/20.500.14594/98201Due to Android’s flexibility in installing applications, it is one of the most popular mobile operating systems. Some Android users install applications from third-party stores even though they have the official application store, Google Play. These third-party stores usually have the mod version and the self-proclaimed original applications, which can be repackaged applications. Applications on these third-party stores can introduce security risks because of the non-transparent alteration and uploading processes. In this research, we inspect 492 Android applications from ten third-party stores for repackaged applications using information of APK files and a token-based code clone detection technique. We also classify repackaged applications as benign or malicious and categorize malicious applications into twelve malware categories. For the malware classification, we use machine learning techniques, including Random Forest, Decision Tree, and XGBoost, with the CCCS-CIC-AndMal-2020 Android malware dataset. Finally, we compare the results with VirusTotal, a well-known malware scanning website.Computer ScienceEngineeringDetecting Malicious Android Game Applications on Third-Party Stores Using Machine LearningBook ChapterSCOPUS10.1007/978-3-031-57916-5_212-s2.0-8519132771023674520