The Evolution of Android Malware and Android Analysis Techniques

被引:211
|
作者
Tam, Kimberly [1 ,3 ,4 ]
Feizollah, Ali [2 ,5 ]
Anuar, Nor Badrul [2 ,5 ]
Salleh, Rosli [2 ,5 ]
Cavallaro, Lorenzo [1 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp, Room 231,McCrea Bldg,Egham Hill, Egham TW20 0EX, Surrey, England
[2] Univ Malaya, Dept Comp Syst & Technol, Kuala Lumpur, Malaysia
[3] Hewlett Packard Labs, Bristol, Avon, England
[4] 35202 Severn Dr, Newark, CA 94560 USA
[5] Fac Comp Sci & Informat Technol, Dept Comp Syst & Technol, Jalan Univ, Kuala Lumpur 50603, Wilayah Perseku, Malaysia
基金
英国工程与自然科学研究理事会;
关键词
Android; malware; static analysis; dynamic analysis; detection; classification;
D O I
10.1145/3017427
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.
引用
收藏
页数:41
相关论文
共 50 条
  • [1] Comparative Analysis of Android Malware Detection Techniques
    Painter, Nishant
    Kadhiwala, Bintu
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 : 131 - 139
  • [2] Analysis of Feature Selection Techniques for Android Malware Detection
    Guyton, Fred
    Li, Wei
    Wang, Ling
    Kumar, Ajoy
    [J]. SOUTHEASTCON 2022, 2022, : 96 - 103
  • [3] A Survey on Android Malware Detection Techniques
    Riasat, Rubata
    Sakeena, Muntaha
    Wang, Chong
    Sadiq, Abdul Hannan
    Wang, Yong-ji
    [J]. INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND NETWORK ENGINEERING (WCNE 2016), 2016,
  • [4] Demystifying the Evolution of Android Malware Variants
    Tang, Lihong
    Chen, Xiao
    Wen, Sheng
    Li, Li
    Grobler, Marthie
    Xiang, Yang
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3324 - 3341
  • [5] Dissecting Android Malware: Characterization and Evolution
    Zhou, Yajin
    Jiang, Xuxian
    [J]. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 95 - 109
  • [6] Challenges in Android Malware Analysis
    Tong, Valerie Viet Triem
    Lalande, Jean Francois
    Leslous, Mourad
    [J]. ERCIM NEWS, 2016, (106): : 42 - +
  • [7] Android Platform Malware Analysis
    Alfalqi, Khalid
    Alghamdi, Rubayyi
    Waqdan, Mofareh
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (01) : 140 - 146
  • [8] Framework for malware analysis in Android
    Urcuqui Lopez, Christian Camilo
    Navarro Cadavid, Andres
    [J]. SISTEMAS & TELEMATICA, 2016, 14 (37): : 45 - 56
  • [9] The Analysis of Android Malware Behaviors
    Fan Yuhui
    Xu Ning
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 335 - 345
  • [10] The Android Malware Static Analysis: Techniques, Limitations, and Open Challenges
    Bakour, Khaled
    Unver, H. Murat
    Ghanem, Razan
    [J]. 2018 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2018, : 586 - 593