We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Survey on Various Malware Detection Techniques on Mobile Platform

by Aashima Malhotra, Karan Bajaj
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 139 - Number 5
Year of Publication: 2016
Authors: Aashima Malhotra, Karan Bajaj
10.5120/ijca2016909159

Aashima Malhotra, Karan Bajaj . A Survey on Various Malware Detection Techniques on Mobile Platform. International Journal of Computer Applications. 139, 5 ( April 2016), 15-20. DOI=10.5120/ijca2016909159

@article{ 10.5120/ijca2016909159,
author = { Aashima Malhotra, Karan Bajaj },
title = { A Survey on Various Malware Detection Techniques on Mobile Platform },
journal = { International Journal of Computer Applications },
issue_date = { April 2016 },
volume = { 139 },
number = { 5 },
month = { April },
year = { 2016 },
issn = { 0975-8887 },
pages = { 15-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume139/number5/24486-2016909159/ },
doi = { 10.5120/ijca2016909159 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:40:08.407998+05:30
%A Aashima Malhotra
%A Karan Bajaj
%T A Survey on Various Malware Detection Techniques on Mobile Platform
%J International Journal of Computer Applications
%@ 0975-8887
%V 139
%N 5
%P 15-20
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid arrival of mobile platforms on the market, android Platform has become a market leader in 2015 Q2, according to IDC. As Android has ruling most of the market, the problem of malware threats and security is also increasing. In this review paper, a fastidious study of the terms related to mobile malware and the techniques used for the detection of malware is done. Some proposed methods and type of approaches used in those methods are also summarized.

References
  1. Schmidt A.D. 2011. Detection of Smartphone Malware, doctoral diss., Berlin Institute of Technology, Berlin, Germany.
  2. Landage, J. and Wankhade, M. P. 2013. Malware and Malware Detection Techniques: A Survey, International Journal of Engineering Research and Technology, Vol. 2, no. 12, 2013.
  3. Felt, Porter, A., Finifter, M., Chin, E., Hanna, S. and Wagner, D. 2011. A survey of mobile malware in the wild, Proc. 1st ACM workshop on Security and privacy in smartphones and mobile devices, ACM, New York, 2011, pp. 3-14.
  4. Dini, Gianluca, Martinelli, F. and Sgandurra, D.2013. MADAM: A Multi-level Anomaly Detector for Android Malware, Journal of MMM-ACNS, vol. 12, 2013, pp. 240-253.
  5. Huang, C.Y. , Tsai, Y.T. and Hsu, C.H. 2013. Performance evaluation on permission-based detection for android malware, Advances in Intelligent Systems and Applications, Springer, Berlin Heidelberg, vol. 2, 2013, pp. 111-120.
  6. Shabtai, A., Moskovitch, R., Elovici, Y. and Glezer, C. 2009. Detection of malicious code by applying machine learning classifiers on static features: A state-of-art survey, Journal of Information Security Technical Report, vol. 14, 2009, pp. 16-29.
  7. Christodorescui, S. and Jha, S. 2006. Static analysis of executables to detect malicious patterns, Wisconsin Univ-Madison Dept Of Computer Sciences, 2006.
  8. Schmidt, A.D. 2009. Static analysis of executables for collaborative malware detection on android, In Communications IEEE International Conference, Dresden, Germany, 2009, pp. 1-5.
  9. Schmidt, A.D. , Schmidt, H.G., Clausen, J., Yuksel, K.A., Kiraz, O., Camtepe, A. and Albayrak, S. 2008. Enhancing security of linux-based android devices, Proc. of 15th International Linux Kongress, Lehmann, Hamberg, Germany, 2008.
  10. Schmidt, A.D., Camtepe, A. and Albayrak, S. 2010. Static smartphone malware detection, Proc. of the 5th Security Research Conference (Future Security), 2010, pp. 146.
  11. Blasing, T., Schmidt, A.D., Batyuk, L., Camtepe, S. A. and Albayrak, S. 2010. An android application sandbox system for suspicious software detection, 5th International Conference on Malicious and Unwanted Software (Malware), Nancy, France, 2010, pp. 55-62.
  12. Portokalidis, G., Homburg, P., Anagnostakis, K. and Bos, H. 2010. Paranoid android: versatile protection for smartphones, Proc. of the 26th Annual Computer Security Applications Conference, ACSAC, ACM, New York, 2010, pp. 347-356.
  13. Shabtai, A. , Kanonov, U. and Elovici, Y. 2010. Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method, Journal of Systems and Software, vol. 83, 2010, pp. 1524-1537.
  14. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C. and Weiss, Y. 2012. Andromaly: a behavioural malware detection framework for android devices, Journal of Intelligent Information Systems, vol. 38, 2012, pp. 161-190.
  15. Enck, William, Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L. P., Jung, J., McDaniel, P. and Sheth, A.N. 2014 TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones, Journal of ACM Transactions on Computer Systems (TOCS), vol. 32, 2014, article 5.
  16. Grace, M., Zhou, Y., Zhang, Q., Zou, S. and Jiang, X. 2012 Risk-Ranker: scalable and accurate zero-day Android malware detection, Proc. of MobiSys, New York, NY, USA, 2012, pp. 281-294.
  17. Egele, M., Kruegel, C., Kirda, E., and Vigna, G. 2011. PiOS: detecting privacy leaks in iOS applications, In NDSS, 18th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, 2011.
  18. Burguera, I., Zurutuza, U. and Tehrani, S.N. 2011. Crowdroid: behaviour-based malware detection system for android, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, ACM, Chicago, Illinois, USA, 2011, pp. 15-26.
  19. Fan, y., ye, y. and Chen, L. 2016. Malicious sequential pattern mining for automatic malware detection, Expert systems with application (Jan. 2016).
Index Terms

Computer Science
Information Sciences

Keywords

Malware Types of malware Detection techniques Permissions.