Android Security: A Survey of Issues, Malware Penetration, and Defenses

被引:289
作者
Faruki, Parvez [1 ]
Bharmal, Ammar [1 ]
Laxmi, Vijay [1 ]
Ganmoor, Vijay [1 ]
Gaur, Manoj Singh [1 ]
Conti, Mauro [2 ]
Rajarajan, Muttukrishnan [3 ]
机构
[1] MNIT, Dept Comp Engn, Jaipur 302017, Rajasthan, India
[2] Univ Padua, Dept Math, I-35122 Padua, Italy
[3] City Univ London, Sch Engn & Math Sci, Elect & Elect Engn, London EC1V 0HB, England
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2015年 / 17卷 / 02期
关键词
Android malware; static analysis; dynamic analysis; behavioral analysis; obfuscation; stealth malware; SYSTEM;
D O I
10.1109/COMST.2014.2386139
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smartphones have become pervasive due to the availability of office applications, Internet, games, vehicle guidance using location-based services apart from conventional services such as voice calls, SMSes, and multimedia services. Android devices have gained huge market share due to the open architecture of Android and the popularity of its application programming interface (APIs) in the developer community. Increased popularity of the Android devices and associated monetary benefits attracted the malware developers, resulting in big rise of the Android malware apps between 2010 and 2014. Academic researchers and commercial antimalware companies have realized that the conventional signature-based and static analysis methods are vulnerable. In particular, the prevalent stealth techniques, such as encryption, code transformation, and environment-aware approaches, are capable of generating variants of known malware. This has led to the use of behavior-, anomaly-, and dynamic-analysis-based methods. Since a single approach may be ineffective against the advanced techniques, multiple complementary approaches can be used in tandem for effective malware detection. The existing reviews extensively cover the smartphone OS security. However, we believe that the security of Android, with particular focus on malware growth, study of antianalysis techniques, and existing detection methodologies, needs an extensive coverage. In this survey, we discuss the Android security enforcement mechanisms, threats to the existing security enforcements and related issues, malware growth timeline between 2010 and 2014, and stealth techniques employed by the malware authors, in addition to the existing detection methods. This review gives an insight into the strengths and shortcomings of the known research methodologies and provides a platform, to the researchers and practitioners, toward proposing the next-generation Android security, analysis, and malware detection techniques.
引用
收藏
页码:998 / 1022
页数:25
相关论文
共 81 条
  • [1] A. Inc, CLASS DEX CONV DX
  • [2] Aafer Y, 2013, L N INST COMP SCI SO, V127, P86
  • [3] Andre G, 2013, TECH REP
  • [4] [Anonymous], 2012, INT C DET INTR MALW
  • [5] [Anonymous], 2012, TECH REP
  • [6] [Anonymous], 2013, Tech. Rep.
  • [7] [Anonymous], USENIX SECURITY SECU
  • [8] [Anonymous], P 7 EUR WORKSH SYST
  • [9] [Anonymous], 2012, P 2 ACM C DAT APPL S, DOI DOI 10.1145/2133601.2133640
  • [10] AppBrain, NUMB APPL AV GOOGL P