Skip to main content

2019 | OriginalPaper | Buchkapitel

Android Malware Detection Techniques

verfasst von : Shreya Khemani, Darshil Jain, Gaurav Prasad

Erschienen in: Emerging Research in Computing, Information, Communication and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Importance of personal data has increased along with the evolution of technology. To steal and misuse this data, malicious programs and software are written to exploit the vulnerabilities of the current system. These programs are referred to as malware. Malware harasses the users until their intentions are fulfilled. Earlier malware was major threats to the personal computers. However, now there is a lateral shift in interest toward Android operating system, which has a large market share in smartphones. Day by day, malware is getting stronger and new type of malware is being written so that they are undetected by the present software. Security parameters must be changed to cope up with the changes happening around the world. In this paper, we discuss the different types of malware analysis techniques which are proposed till date to detect the malware in Android platform. Moreover, it also analyzes and concludes about the suitable techniques applicable to the different type of malware.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat Seth, R., Kaushal, R. (2015). Permission based malware analysis and detection in android. Seth, R., Kaushal, R. (2015). Permission based malware analysis and detection in android.
6.
Zurück zum Zitat Liu, X., Liu, J. (2014, April). A two-layered Permission-based android malware detection scheme. In Proceedings of 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, Oxford, UK (pp. 142–148). Liu, X., Liu, J. (2014, April). A two-layered Permission-based android malware detection scheme. In Proceedings of 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, Oxford, UK (pp. 142–148).
7.
Zurück zum Zitat Shahriar, H., Islam, M., Clincy, V. (2017). Android malware detection using permission analysis. In Proceedings of Southeast Con, Charlotte, NC, USA. Shahriar, H., Islam, M., Clincy, V. (2017). Android malware detection using permission analysis. In Proceedings of Southeast Con, Charlotte, NC, USA.
8.
Zurück zum Zitat Faruki, P., Laxmi, V., Bharmal, A., Gaur, M. S., & Ganmoor, V. (2015). AndroSimilar: Robust signature for detecting variants of android malware. Journal of Information Security and Applications, 22, 66–80.CrossRef Faruki, P., Laxmi, V., Bharmal, A., Gaur, M. S., & Ganmoor, V. (2015). AndroSimilar: Robust signature for detecting variants of android malware. Journal of Information Security and Applications, 22, 66–80.CrossRef
9.
Zurück zum Zitat Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2012). A survey on automated dynamic analysis tools and techniques. ACM Computing Surveys, 44(2), 1–42.CrossRef Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2012). A survey on automated dynamic analysis tools and techniques. ACM Computing Surveys, 44(2), 1–42.CrossRef
10.
Zurück zum Zitat Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011). Crowdroid: Behaviour-based malware detection system for android. In Proceedings of the 1st ACM Work. Security and Privacy in Smartphones and Mobile Devices-SPSM’11 (p. 15). Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011). Crowdroid: Behaviour-based malware detection system for android. In Proceedings of the 1st ACM Work. Security and Privacy in Smartphones and Mobile Devices-SPSM’11 (p. 15).
11.
Zurück zum Zitat Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H. (2010).Paranoid android: Versatile protection For smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, ASCAC’10 (pp. 347–356). Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H. (2010).Paranoid android: Versatile protection For smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, ASCAC’10 (pp. 347–356).
12.
Zurück zum Zitat Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., & Weiss, Y. (2011). Andromaly: A behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 1–30. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., & Weiss, Y. (2011). Andromaly: A behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 1–30.
13.
Zurück zum Zitat Enck, W., Gilbert, P., Chun, B. G., Jung, J., McDaniel, P., & Sheth, A. N. (2010). Taintdroid: An information flow tracking system for real-time privacy monitoring on smartphones. In Osdi’10 (Vol. 49, pp. 1–6). Enck, W., Gilbert, P., Chun, B. G., Jung, J., McDaniel, P., & Sheth, A. N. (2010). Taintdroid: An information flow tracking system for real-time privacy monitoring on smartphones. In Osdi’10 (Vol. 49, pp. 1–6).
14.
Zurück zum Zitat Amos, B., Turner, H., & White, J. (2013). Applying machine learning classifiers to dynamic android malware detection at scale (pp. 1666–1671). Amos, B., Turner, H., & White, J. (2013). Applying machine learning classifiers to dynamic android malware detection at scale (pp. 1666–1671).
15.
Zurück zum Zitat McLaughlin, N., Del Rincon, J. M., Kang, B., Yerima, S., Miller, P., Sezer, S. … Ahn, G. J. (2017). Deep android malware detection. In Proceedings of CODASPY, Scottsdale, Arizona, USA. McLaughlin, N., Del Rincon, J. M., Kang, B., Yerima, S., Miller, P., Sezer, S. … Ahn, G. J. (2017). Deep android malware detection. In Proceedings of CODASPY, Scottsdale, Arizona, USA.
16.
Zurück zum Zitat Demontis, A., Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K. … Roli, F. (2017). Yes, Machine learning can be more secure! A case study on android malware D=detection. IEEE Transactions on Dependable and Secure Computing. Demontis, A., Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K. … Roli, F. (2017). Yes, Machine learning can be more secure! A case study on android malware D=detection. IEEE Transactions on Dependable and Secure Computing.
17.
Zurück zum Zitat Idrees, F., Rajarajan, M., Conti, M., Chen, T. M., & Rahulamathavan, Y. (2017). PIndroid: A novel android malware detection system using ensemble learning methods. Computer and Security, 68, 36–46.CrossRef Idrees, F., Rajarajan, M., Conti, M., Chen, T. M., & Rahulamathavan, Y. (2017). PIndroid: A novel android malware detection system using ensemble learning methods. Computer and Security, 68, 36–46.CrossRef
18.
Zurück zum Zitat Wei, F., Li, Y., Roy, S., Ou, X., & Zhou, W. (2017). Deep ground truth analysis of current android malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability and Assessment (DIMVA) (pp. 252–276). Wei, F., Li, Y., Roy, S., Ou, X., & Zhou, W. (2017). Deep ground truth analysis of current android malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability and Assessment (DIMVA) (pp. 252–276).
Metadaten
Titel
Android Malware Detection Techniques
verfasst von
Shreya Khemani
Darshil Jain
Gaurav Prasad
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-6001-5_36

Neuer Inhalt