README Data hosted and ReadMe file provided by AZSecure Data and the University of Arizona Artificial Intelligence Lab. Citation information below. M0DROID.zip file contains: M0DROID_dataset.db m0droid-readme.txt DESCRIPTION This dataset comes bundled with the M0DROID mobile malware analysis tool, which is designed to detect Android malware using signatures derived from system call requests of individual Android APKs. The dataset itself contains signatures generated from many Android APKs, and can be used separately from the detection engine. file types: Date range of data: November 2014 Number of _____ Collection method: The data was generated using real Android APKs as input, and signatures as output. The dataset comprises these signatures. The tool to generate the signatures is designed by the authors, and is called the server analyzer Topics and keywords: M0DROID, Android, signature, malware, detection, SQL HOW TO CITE THIS DATASET Author(s): Ali Dehghantanha and Mohsen Damshenas Title: M0DROID Dataset Publisher: AZSecure Data Location: Copy and paste the location where you retrieve this file from within http://www.azsecure-data.org/ or use the DOI assigned to this digital object. Publication date: May 2018 IEEE formatted citation: A. Dehghantanha and M. Damshenas, M0DROID Dataset, AZSecure Data. Available http://www.azsecure-data.org/ [2018] ALSO CITE the following related publications: Mohsen Damshenas, Ali Dehghantanha, Kim-Kwang Raymond Choo & Ramlan Mahmud (2015) M0Droid: An Android Behavioral-Based Malware Detection Model, Journal of Information Privacy and Security, 11:3, 141-157, DOI: 10.1080/15536548.2015.1073510 FUNDING SOURCE: This work is supported by the Research University Grant Scheme (RUGS)–University Putra Malaysia (UPM) Project 9371600 (0502122147RU).