The Evolution of Android Malware and Android Analysis Techniques
-
- Kimberly Tam
- Information Security Group, Royal Holloway, University of London
-
- Ali Feizollah
- Department of Computer System and Technology, University of Malaya
-
- Nor Badrul Anuar
- Department of Computer System and Technology, University of Malaya
-
- Rosli Salleh
- Department of Computer System and Technology, University of Malaya
-
- Lorenzo Cavallaro
- Information Security Group, Royal Holloway, University of London, Egham Hill, United Kingdom
Description
<jats:p>With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.</jats:p>
Journal
-
- ACM Computing Surveys
-
ACM Computing Surveys 49 (4), 1-41, 2017-01-13
Association for Computing Machinery (ACM)
- Tweet
Details 詳細情報について
-
- CRID
- 1363670319957866752
-
- DOI
- 10.1145/3017427
-
- ISSN
- 15577341
- 03600300
-
- Data Source
-
- Crossref