A comprehensive review on permissions-based Android malware detection

被引:2
|
作者
Sharma, Yash [1 ]
Arora, Anshul [1 ]
机构
[1] Delhi Technol Univ, Dept Appl Math, Delhi 110042, India
关键词
Android security; Android malware; Permissions based detection; Static detection; Mobile security; Literature review; LEARNING TECHNIQUES; FEATURE-SELECTION; STATIC ANALYSIS; DEEP; FRAMEWORK; PATTERNS; CLASSIFICATION; IDENTIFICATION; MANIFEST; ATTACKS;
D O I
10.1007/s10207-024-00822-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The first Android-ready "G1" phone debuted in late October 2008. Since then, the growth of Android malware has been explosive, analogous to the rise in the popularity of Android. The major positive aspect of Android is its open-source nature, which empowers app developers to expand their work. However, authors with malicious intentions pose grave threats to users. In the presence of such threats, Android malware detection is the need of an hour. Consequently, researchers have proposed various techniques involving static, dynamic, and hybrid analysis to address such threats to numerous features in the last decade. However, the feature that most researchers have extensively used to perform malware analysis and detection in Android security is Android permission. Hence, to provide a clarified overview of the latest and past work done in Android malware analysis and detection, we perform a comprehensive literature review using permissions as a central feature or in combination with other components by collecting and analyzing 205 studies from 2009 to 2023. We extracted information such as the choice opted by researchers between analysis or detection, techniques used to select or rank the permissions feature set, features used along with permissions, detection models employed, malware datasets used by researchers, and limitations and challenges in the field of Android malware detection to propose some future research directions. In addition, on the basis of the information extracted, we answer the six research questions designed considering the above factors.
引用
收藏
页码:1877 / 1912
页数:36
相关论文
共 50 条
  • [21] Mining and Detection of Anaroia Malware Based on Permissions
    Sahal, Abdirashid Ahmed
    Alam, Shahid
    Sogukpinar, Ibrahim
    2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 264 - 268
  • [22] IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions
    Sharma, Yash
    Arora, Anshul
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (33) : 78957 - 79008
  • [23] Review of Android Malware Detection Based on Deep Learning
    Wang, Zhiqiang
    Liu, Qian
    Chi, Yaping
    IEEE ACCESS, 2020, 8 : 181102 - 181126
  • [24] Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review
    Ehsan, Adeel
    Catal, Cagatay
    Mishra, Alok
    SENSORS, 2022, 22 (20)
  • [25] HyDroid: android malware detection using network flow combined with permissions and intent filter
    Boukhamla, Akram Zine Eddine
    Verma, Abhishek
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2023, 22 (01) : 70 - 91
  • [26] A Comprehensive Analysis of the Android Permissions System
    Almomani, Iman M.
    Al Khayer, Aala
    IEEE ACCESS, 2020, 8 : 216671 - 216688
  • [27] A Review of Android Malware Detection Approaches Based on Machine Learning
    Liu, Kaijun
    Xu, Shengwei
    Xu, Guoai
    Zhang, Miao
    Sun, Dawei
    Liu, Haifeng
    IEEE ACCESS, 2020, 8 (08): : 124579 - 124607
  • [28] Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection
    Guerra-Manzanares, Alejandro
    Bahsi, Hayretdin
    Luckner, Marcin
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 65 - 96
  • [29] Leveraging the first line of defense: a study on the evolution and usage of android security permissions for enhanced android malware detection
    Alejandro Guerra-Manzanares
    Hayretdin Bahsi
    Marcin Luckner
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 65 - 96
  • [30] Predicting Android malware combining permissions and API call sequences
    Xin Chen
    Haihua Yu
    Dongjin Yu
    Jie Chen
    Xiaoxiao Sun
    Software Quality Journal, 2023, 31 : 655 - 685