The Evolution of Android Malware and Android Analysis Techniques

  • Kimberly Tam
    Information Security Group, Royal Holloway, University of London
  • Ali Feizollah
    Department of Computer System and Technology, University of Malaya
  • Nor Badrul Anuar
    Department of Computer System and Technology, University of Malaya
  • Rosli Salleh
    Department of Computer System and Technology, University of Malaya
  • Lorenzo Cavallaro
    Information Security Group, Royal Holloway, University of London, Egham Hill, United Kingdom

Description

<jats:p>With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.</jats:p>

Journal

  • ACM Computing Surveys

    ACM Computing Surveys 49 (4), 1-41, 2017-01-13

    Association for Computing Machinery (ACM)

Citations (2)*help

See more

Details 詳細情報について

Report a problem

Back to top