Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Methods for Detecting Android Malware: Employing Mobile Devices to Improve Procedures for Inquiry-Based Learning

View through CrossRef
The operating system (OS) of a computer controls both its hardware and software. It handles necessary functions including input and output processing, file and memory management, and peripheral device management, including disc drives and printers. Programs created for particular purposes are referred to as application software. These programs, which are frequently open source and freely accessible, contribute to the growing number of downloads. This paper discusses the basics of Android malware, its evolution, and malware analysis tools and techniques. Providing the research gaps and giving a review of the literature on Android malware detection using machine learning and deep learning are its main objectives. It offers the knowledge gathered from the literature as well as potential avenues for future research, which may aid in the development of reliable and precise methods for classifying Android malware. This paper conducts a systematic and comprehensive assessment of the methods and tools utilized for the analysis, classification, and detection of malicious Android apps. Several research gaps are indicated based on the thorough literature evaluation. Additionally, the report offers insights on future research paths that may aid academics in developing novel and reliable methods for identifying and categorizing Android malware.
Title: Methods for Detecting Android Malware: Employing Mobile Devices to Improve Procedures for Inquiry-Based Learning
Description:
The operating system (OS) of a computer controls both its hardware and software.
It handles necessary functions including input and output processing, file and memory management, and peripheral device management, including disc drives and printers.
Programs created for particular purposes are referred to as application software.
These programs, which are frequently open source and freely accessible, contribute to the growing number of downloads.
This paper discusses the basics of Android malware, its evolution, and malware analysis tools and techniques.
Providing the research gaps and giving a review of the literature on Android malware detection using machine learning and deep learning are its main objectives.
It offers the knowledge gathered from the literature as well as potential avenues for future research, which may aid in the development of reliable and precise methods for classifying Android malware.
This paper conducts a systematic and comprehensive assessment of the methods and tools utilized for the analysis, classification, and detection of malicious Android apps.
Several research gaps are indicated based on the thorough literature evaluation.
Additionally, the report offers insights on future research paths that may aid academics in developing novel and reliable methods for identifying and categorizing Android malware.

Related Results

AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
AMalLSTM: ANDROID MALWARE DETECTION USING LSTM
AMalLSTM: ANDROID MALWARE DETECTION USING LSTM
Android smartphone apps are becoming increasingly popular, but their security is a concern. Malware can cause damage to mobile devices and servers. Developing detection technologie...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
 The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
An Analysis of Machine Learning-Based Android Malware Detection Approaches
An Analysis of Machine Learning-Based Android Malware Detection Approaches
Abstract Despite the fact that Android apps are rapidly expanding throughout the mobile ecosystem, Android malware continues to emerge. Malware operations are on the...
A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
<p>Android has become the dominant operating system for portable devices, making it a valuable asset that needs protection. Though Android is very popular; it has several vul...
An Android Malware Detection Approach Based on Summation of Multi-order Derivatives LSTM
An Android Malware Detection Approach Based on Summation of Multi-order Derivatives LSTM
Abstract With the popularity of the Android operating system on mobile devices, unscrupulous people prefer to attack Android devices, which results in the emergence of Andr...
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
HYBRID DEEP LEARNING EFFECTIVENESS OF IMAGE-BASED MALWARE DETECTION
The current high rate of malware variant production each day produces hundreds of thousands of new variants making signature detection methods ineffective. Deep learning patterns s...
Clone detection to prevent software piracy in android play store
Clone detection to prevent software piracy in android play store
Android is currently one of the most popular smartphone operating systems. Many application developers have been enticed by the enormous demand for mobile smartphone devices. The a...

Back to Top