A comprehensive review on permissions-based Android malware detection

被引:2
|
作者
Sharma, Yash [1 ]
Arora, Anshul [1 ]
机构
[1] Delhi Technol Univ, Dept Appl Math, Delhi 110042, India
关键词
Android security; Android malware; Permissions based detection; Static detection; Mobile security; Literature review; LEARNING TECHNIQUES; FEATURE-SELECTION; STATIC ANALYSIS; DEEP; FRAMEWORK; PATTERNS; CLASSIFICATION; IDENTIFICATION; MANIFEST; ATTACKS;
D O I
10.1007/s10207-024-00822-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The first Android-ready "G1" phone debuted in late October 2008. Since then, the growth of Android malware has been explosive, analogous to the rise in the popularity of Android. The major positive aspect of Android is its open-source nature, which empowers app developers to expand their work. However, authors with malicious intentions pose grave threats to users. In the presence of such threats, Android malware detection is the need of an hour. Consequently, researchers have proposed various techniques involving static, dynamic, and hybrid analysis to address such threats to numerous features in the last decade. However, the feature that most researchers have extensively used to perform malware analysis and detection in Android security is Android permission. Hence, to provide a clarified overview of the latest and past work done in Android malware analysis and detection, we perform a comprehensive literature review using permissions as a central feature or in combination with other components by collecting and analyzing 205 studies from 2009 to 2023. We extracted information such as the choice opted by researchers between analysis or detection, techniques used to select or rank the permissions feature set, features used along with permissions, detection models employed, malware datasets used by researchers, and limitations and challenges in the field of Android malware detection to propose some future research directions. In addition, on the basis of the information extracted, we answer the six research questions designed considering the above factors.
引用
收藏
页码:1877 / 1912
页数:36
相关论文
共 50 条
  • [11] Research on data mining of permissions mode for Android malware detection
    Chao Wang
    Qingzhen Xu
    Xiuli Lin
    Shouqiang Liu
    Cluster Computing, 2019, 22 : 13337 - 13350
  • [12] Research on data mining of permissions mode for Android malware detection
    Wang, Chao
    Xu, Qingzhen
    Lin, Xiuli
    Liu, Shouqiang
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 13337 - 13350
  • [13] STATIC DETECTION OF ANDROID MALWARE BY USING PERMISSIONS AND API CALLS
    Chan, Patrick P. K.
    Song, Wen-Kai
    PROCEEDINGS OF 2014 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2014, : 82 - 87
  • [14] Detection of Android Malware by Static Analysis on Permissions and Sensitive Functions
    Su, Ming-Yang
    Fung, Kek-Tung
    2016 EIGHTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN), 2016, : 873 - 875
  • [15] You are what the permissions told me! Android malware detection based onhybrid tactics
    Wang, Huanran
    Zhang, Weizhe
    He, Hui
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [16] Experimental analysis of Android malware detection based on combinations of permissions and API-calls
    Abhishek Kumar Singh
    C. D. Jaidhar
    M. A. Ajay Kumara
    Journal of Computer Virology and Hacking Techniques, 2019, 15 : 209 - 218
  • [17] Experimental analysis of Android malware detection based on combinations of permissions and API-calls
    Singh, Abhishek Kumar
    Jaidhar, C. D.
    Kumara, M. A. Ajay
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2019, 15 (03) : 209 - 218
  • [18] NATICUSdroid: A malware detection framework for Android using native and custom permissions
    Mathur, Akshay
    Podila, Laxmi Mounika
    Kulkarni, Keyur
    Niyaz, Quamar
    Javaid, Ahmad Y.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58 (58)
  • [19] RepassDroid: Automatic Detection of Android Malware Based on Essential Permissions and Semantic Features of Sensitive APIs
    Xie, Niannian
    Zeng, Fanping
    Qin, Xiaoxia
    Zhang, Yu
    Zhou, Mingsong
    Lv, Chengcheng
    PROCEEDINGS 2018 12TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2018), 2018, : 52 - 59
  • [20] Comprehensive Android Malware Detection Based on Federated Learning Architecture
    Fang, Wenbo
    He, Junjiang
    Li, Wenshan
    Lan, Xiaolong
    Chen, Yang
    Li, Tao
    Huang, Jiwu
    Zhang, Linlin
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3977 - 3990