Javascript must be enabled to continue!
A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
View through CrossRef
<p>Android has become the dominant operating system for portable devices, making it a valuable asset that needs protection. Though Android is very popular; it has several vulnerabilities which attackers use for malicious intents. In this paper, we present a comprehensive study on the threats in Android OS that various malware developers exploit and the different malware functionality based on Android’s threats. Furthermore, we analyze and evaluate the anti-malware approaches implemented to face the malware functionalities. Finally, we analyze and categorize malware developers’ most common anti-analysis techniques to evade anti-malware approaches. It comes to our attention that many papers covered each topic separately; however, we could not find one comprehensive study that covers Android with such details that it could be used as a research handbook on Android malware. This is the main novelty and contribution of this work.</p>
<p> </p>
Journal of Internet Technology
Title: A Critical Analysis on Android Vulnerabilities, Malware, Anti-malware and Anti-malware Bypassing
Description:
<p>Android has become the dominant operating system for portable devices, making it a valuable asset that needs protection.
Though Android is very popular; it has several vulnerabilities which attackers use for malicious intents.
In this paper, we present a comprehensive study on the threats in Android OS that various malware developers exploit and the different malware functionality based on Android’s threats.
Furthermore, we analyze and evaluate the anti-malware approaches implemented to face the malware functionalities.
Finally, we analyze and categorize malware developers’ most common anti-analysis techniques to evade anti-malware approaches.
It comes to our attention that many papers covered each topic separately; however, we could not find one comprehensive study that covers Android with such details that it could be used as a research handbook on Android malware.
This is the main novelty and contribution of this work.
</p>
<p> </p>.
Related Results
Android Malware Detection Techniques: A Literature Review
Android Malware Detection Techniques: A Literature Review
Objective:
This paper provides the basics of Android malware, its evolution and tools and
techniques for malware analysis. Its main aim is to present a review of the literature on ...
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
An Analysis of Machine Learning-Based Android Malware Detection Approaches
An Analysis of Machine Learning-Based Android Malware Detection Approaches
Abstract
Despite the fact that Android apps are rapidly expanding throughout the mobile ecosystem, Android malware continues to emerge. Malware operations are on the...
An experimental malware for smartphones
An experimental malware for smartphones
Android operating system has become one of the platforms developers used to introduce their malicious activities into the smartphone world through Android Applications (App). Alth...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
AMalLSTM: ANDROID MALWARE DETECTION USING LSTM
AMalLSTM: ANDROID MALWARE DETECTION USING LSTM
Android smartphone apps are becoming increasingly popular, but their security is a concern. Malware can cause damage to mobile devices and servers. Developing detection technologie...
Clone detection to prevent software piracy in android play store
Clone detection to prevent software piracy in android play store
Android is currently one of the most popular smartphone operating systems. Many application developers have been enticed by the enormous demand for mobile smartphone devices. The a...
An Android Malware Detection Approach Based on Summation of Multi-order Derivatives LSTM
An Android Malware Detection Approach Based on Summation of Multi-order Derivatives LSTM
Abstract
With the popularity of the Android operating system on mobile devices, unscrupulous people prefer to attack Android devices, which results in the emergence of Andr...

