Nothing Special   »   [go: up one dir, main page]

Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 469))

Abstract

In recent years, the widespread adoption of smartphones has led to a new age of information exchange. Among smartphones, Android devices have gained huge popularity due to the open architecture of Android and advanced programmable software framework to develop mobile applications. However, the pervasive adoption of Android is coupled with progressively uncontrollable malware threats. This paper gives an insight of existing work in Android malware detection. Additionally, this paper highlights the parametric comparison of existing Android malware detection techniques. Thus, this paper aims to study various Android malware detection techniques and to identify plausible research direction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. G. Inc., Gartner Says Smartphone Sales Surpassed One Billion Units in 2014, http://www.gartner.com/newsroom/id/2996817

  2. Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan.: Android Security: A Survey of Issues, Malware Penetration, and Defenses. In: IEEE communications surveys & tutorials, vol. 7, no. 2, pp. 998–1022 (2015)

    Google Scholar 

  3. Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Ainuddin Wahid Abdul Wahab: A review on feature selection in mobile malware detection. In: Digital Investigation, vol. 13, pp. 22–37 (2015)

    Google Scholar 

  4. Android.Bgserv, http://www.symantec.com/security_response/writeup.jsp?docid=2011031005-2918-99

  5. Android Hipposms, http://www.csc.ncsu.edu/faculty/jiang/HippoSMS/

  6. RageAgainstTheCage, https://github.com/bibanon/android-development-codex/blob/master/General/Rooting/rageagainstthecage.md

  7. C. A. Castillo.: Android malware past, present, future. In: Mobile Working Security Group McAfee, Santa Clara, CA, USA, Tech. Rep. (2012)

    Google Scholar 

  8. W. Zhou, Y. Zhou, X. Jiang, P. Ning.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proc. 2nd ACM CODASPY, New York, NY, USA, pp. 317–326 (2012)

    Google Scholar 

  9. Android Malware Genome Project, http://www.malgenomeproject.org/

  10. M. Eslahi, R. Salleh, N. B. Anuar.: Mobots: a new generation of botnets on mobile devices and networks. In: IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp. 262–266 (2012)

    Google Scholar 

  11. Sufatrio, Darell J. J. Tan, Tong-Wei Chua, Vrizlynn L. L. Thing.:Securing Android: A Survey, Taxonomy, and Challenges. In: ACM Computing Surveys, vol. 47, no. 4, article 58, pp. 58–103 (2015)

    Google Scholar 

  12. Zheran Fang, Weili Han, Yingjiu Li.: “Permission based Android security: Issues and countermeasures”. In: Computers & Security, pp. 1–14 (2014)

    Google Scholar 

  13. Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming, Kuo-Ping Wu: DroidMat: Android Malware Detection through Manifest and API Calls Tracing. In: Seventh Asia Joint Conference on Information Security, IEEE, pp. 62–69 (2012)

    Google Scholar 

  14. E. Fernandes, B. Crispo, M. Conti.:FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment. In: IEEE Trans. Inf. Forensics Security, vol. 8, no. 6, pp. 1027–1037 (2013)

    Google Scholar 

  15. Takamasa Isohara, Keisuke Takemori, Ayumu Kubota: Kernel-based Behavior Analysis for Android Malware Detection. In: Seventh International Conference on Computational Intelligence and Security, IEEE, pp. 1011–1015 (2011)

    Google Scholar 

  16. Min Zheng, Mingshen Sun, John C.S. Lui: DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, pp. 163–171 (2013)

    Google Scholar 

  17. Kabakus Abdullah Talha, Dogru Ibrahim Alper, Cetin Aydin: APK Auditor: Permission-based Android malware detection system. In: Digital Investigation, vol. 13, pp. 1–14 (2015)

    Google Scholar 

  18. Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani: Crowdroid: Behavior-Based Malware Detection System for Android. In: SPSM, ACM, pp. 15–26 (2011)

    Google Scholar 

  19. Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams, Igor Muttik: A New Android Malware Detection Approach Using Bayesian Classification. In: IEEE 27th International Conference on Advanced Information Networking and Applications, IEEE, pp. 121–128 (2013)

    Google Scholar 

  20. Aiman A. Abu Samra, Kangbin Yim, Osama A. Ghanem: Analysis of Clustering Technique in Android Malware Detection. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE, pp. 729–733 (2013)

    Google Scholar 

  21. Shaikh Bushra Almin, Madhumita Chatterjee: “A Novel Approach to Detect Android Malware”, in International Conf. on Advanced Computing Technologies and Applications (ICACTA). In: Procedia Computer Science, vol. 45, pp. 407–417 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nishant Painter .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Nishant Painter, Bintu Kadhiwala (2017). Comparative Analysis of Android Malware Detection Techniques. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 469. Springer, Singapore. https://doi.org/10.1007/978-981-10-1678-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1678-3_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1677-6

  • Online ISBN: 978-981-10-1678-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics