Javascript must be enabled to continue!
A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
View through CrossRef
<p>Android has become the dominant operating system for portable devices, making it a valuable asset that needs protection. Though Android is very popular; it has several vulnerabilities which attackers use for malicious intents. In this paper, we present a comprehensive study on the threats in Android OS that various malware developers exploit and the different malware functionality based on Android’s threats. Furthermore, we analyze and evaluate the anti-malware approaches implemented to face the malware functionalities. Finally, we analyze and categorize malware developers’ most common anti-analysis techniques to evade anti-malware approaches. It comes to our attention that many papers covered each topic separately; however, we could not find one comprehensive study that covers Android with such details that it could be used as a research handbook on Android malware. This is the main novelty and contribution of this work.</p>
<p> </p>
Journal of Internet Technology
Title: A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
Description:
<p>Android has become the dominant operating system for portable devices, making it a valuable asset that needs protection.
Though Android is very popular; it has several vulnerabilities which attackers use for malicious intents.
In this paper, we present a comprehensive study on the threats in Android OS that various malware developers exploit and the different malware functionality based on Android’s threats.
Furthermore, we analyze and evaluate the anti-malware approaches implemented to face the malware functionalities.
Finally, we analyze and categorize malware developers’ most common anti-analysis techniques to evade anti-malware approaches.
It comes to our attention that many papers covered each topic separately; however, we could not find one comprehensive study that covers Android with such details that it could be used as a research handbook on Android malware.
This is the main novelty and contribution of this work.
</p>
<p> </p>.
Related Results
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
An Analysis of Machine Learning-Based Android Malware Detection Approaches
An Analysis of Machine Learning-Based Android Malware Detection Approaches
Abstract
Despite the fact that Android apps are rapidly expanding throughout the mobile ecosystem, Android malware continues to emerge. Malware operations are on the...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
AMalLSTM: ANDROID MALWARE DETECTION USING LSTM
AMalLSTM: ANDROID MALWARE DETECTION USING LSTM
Android smartphone apps are becoming increasingly popular, but their security is a concern. Malware can cause damage to mobile devices and servers. Developing detection technologie...
Clone detection to prevent software piracy in android play store
Clone detection to prevent software piracy in android play store
Android is currently one of the most popular smartphone operating systems. Many application developers have been enticed by the enormous demand for mobile smartphone devices. The a...
An Android Malware Detection Approach Based on Summation of Multi-order Derivatives LSTM
An Android Malware Detection Approach Based on Summation of Multi-order Derivatives LSTM
Abstract
With the popularity of the Android operating system on mobile devices, unscrupulous people prefer to attack Android devices, which results in the emergence of Andr...
Pengembangan Modul Berbasis Android tentang Kesiapan Kerja
Pengembangan Modul Berbasis Android tentang Kesiapan Kerja
Tujuan penelitian ini adalah menguji coba seberapa efektifitasnya modul berbasis android tentang kesiapan kerja untuk siswa sekolah kejuruan. Metode kajian menggunakan 4-D Â (Defin...
Methods for Detecting Android Malware: Employing Mobile Devices to Improve Procedures for Inquiry-Based Learning
Methods for Detecting Android Malware: Employing Mobile Devices to Improve Procedures for Inquiry-Based Learning
The operating system (OS) of a computer controls both its hardware and software. It handles necessary functions including input and output processing, file and memory management, a...

