Abstract
In recent years, the widespread adoption of smartphones has led to a new age of information exchange. Among smartphones, Android devices have gained huge popularity due to the open architecture of Android and advanced programmable software framework to develop mobile applications. However, the pervasive adoption of Android is coupled with progressively uncontrollable malware threats. This paper gives an insight of existing work in Android malware detection. Additionally, this paper highlights the parametric comparison of existing Android malware detection techniques. Thus, this paper aims to study various Android malware detection techniques and to identify plausible research direction.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
G. Inc., Gartner Says Smartphone Sales Surpassed One Billion Units in 2014, http://www.gartner.com/newsroom/id/2996817
Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan.: Android Security: A Survey of Issues, Malware Penetration, and Defenses. In: IEEE communications surveys & tutorials, vol. 7, no. 2, pp. 998–1022 (2015)
Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Ainuddin Wahid Abdul Wahab: A review on feature selection in mobile malware detection. In: Digital Investigation, vol. 13, pp. 22–37 (2015)
Android.Bgserv, http://www.symantec.com/security_response/writeup.jsp?docid=2011031005-2918-99
Android Hipposms, http://www.csc.ncsu.edu/faculty/jiang/HippoSMS/
RageAgainstTheCage, https://github.com/bibanon/android-development-codex/blob/master/General/Rooting/rageagainstthecage.md
C. A. Castillo.: Android malware past, present, future. In: Mobile Working Security Group McAfee, Santa Clara, CA, USA, Tech. Rep. (2012)
W. Zhou, Y. Zhou, X. Jiang, P. Ning.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proc. 2nd ACM CODASPY, New York, NY, USA, pp. 317–326 (2012)
Android Malware Genome Project, http://www.malgenomeproject.org/
M. Eslahi, R. Salleh, N. B. Anuar.: Mobots: a new generation of botnets on mobile devices and networks. In: IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE), pp. 262–266 (2012)
Sufatrio, Darell J. J. Tan, Tong-Wei Chua, Vrizlynn L. L. Thing.:Securing Android: A Survey, Taxonomy, and Challenges. In: ACM Computing Surveys, vol. 47, no. 4, article 58, pp. 58–103 (2015)
Zheran Fang, Weili Han, Yingjiu Li.: “Permission based Android security: Issues and countermeasures”. In: Computers & Security, pp. 1–14 (2014)
Dong-Jie Wu, Ching-Hao Mao, Te-En Wei, Hahn-Ming, Kuo-Ping Wu: DroidMat: Android Malware Detection through Manifest and API Calls Tracing. In: Seventh Asia Joint Conference on Information Security, IEEE, pp. 62–69 (2012)
E. Fernandes, B. Crispo, M. Conti.:FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment. In: IEEE Trans. Inf. Forensics Security, vol. 8, no. 6, pp. 1027–1037 (2013)
Takamasa Isohara, Keisuke Takemori, Ayumu Kubota: Kernel-based Behavior Analysis for Android Malware Detection. In: Seventh International Conference on Computational Intelligence and Security, IEEE, pp. 1011–1015 (2011)
Min Zheng, Mingshen Sun, John C.S. Lui: DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, pp. 163–171 (2013)
Kabakus Abdullah Talha, Dogru Ibrahim Alper, Cetin Aydin: APK Auditor: Permission-based Android malware detection system. In: Digital Investigation, vol. 13, pp. 1–14 (2015)
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani: Crowdroid: Behavior-Based Malware Detection System for Android. In: SPSM, ACM, pp. 15–26 (2011)
Suleiman Y. Yerima, Sakir Sezer, Gavin McWilliams, Igor Muttik: A New Android Malware Detection Approach Using Bayesian Classification. In: IEEE 27th International Conference on Advanced Information Networking and Applications, IEEE, pp. 121–128 (2013)
Aiman A. Abu Samra, Kangbin Yim, Osama A. Ghanem: Analysis of Clustering Technique in Android Malware Detection. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE, pp. 729–733 (2013)
Shaikh Bushra Almin, Madhumita Chatterjee: “A Novel Approach to Detect Android Malware”, in International Conf. on Advanced Computing Technologies and Applications (ICACTA). In: Procedia Computer Science, vol. 45, pp. 407–417 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media Singapore
About this paper
Cite this paper
Nishant Painter, Bintu Kadhiwala (2017). Comparative Analysis of Android Malware Detection Techniques. In: Satapathy, S., Bhateja, V., Joshi, A. (eds) Proceedings of the International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 469. Springer, Singapore. https://doi.org/10.1007/978-981-10-1678-3_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-1678-3_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1677-6
Online ISBN: 978-981-10-1678-3
eBook Packages: EngineeringEngineering (R0)