Evolution, Detection and Analysis of Malware for Smart Devices

被引:139
作者
Suarez-Tangil, Guillermo [1 ]
Tapiador, Juan E. [1 ]
Peris-Lopez, Pedro [1 ]
Ribagorda, Arturo [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, Comp Secur Lab COSEC, Madrid 28911, Spain
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2014年 / 16卷 / 02期
关键词
smart devices; malware; grayware; smartphones; security; privacy; SECURITY; ATTACKS; SYSTEMS; COMPUTER; NETWORKS; FUTURE;
D O I
10.1109/SURV.2013.101613.00077
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart devices equipped with powerful sensing, computing and networking capabilities have proliferated lately, ranging from popular smartphones and tablets to Internet appliances, smart TVs, and others that will soon appear (e.g., watches, glasses, and clothes). One key feature of such devices is their ability to incorporate third-party apps from a variety of markets. This poses strong security and privacy issues to users and infrastructure operators, particularly through software of malicious (or dubious) nature that can easily get access to the services provided by the device and collect sensory data and personal information. Malware in current smart devices -mostly smartphones and tablets- have rocketed in the last few years, in some cases supported by sophisticated techniques purposely designed to overcome security architectures currently in use by such devices. Even though important advances have been made on malware detection in traditional personal computers during the last decades, adopting and adapting those techniques to smart devices is a challenging problem. For example, power consumption is one major constraint that makes unaffordable to run traditional detection engines on the device, while externalized (i.e., cloud-based) techniques rise many privacy concerns. This article examines the problem of malware in smart devices and recent progress made in detection techniques. We first present a detailed analysis on how malware has evolved over the last years for the most popular platforms. We identify exhibited behaviors, pursued goals, infection and distribution strategies, etc. and provide numerous examples through case studies of the most relevant specimens. We next survey, classify and discuss efforts made on detecting both malware and other suspicious software (grayware), concentrating on the 20 most relevant techniques proposed between 2010 and 2013. Based on the conclusions extracted from this study, we finally provide constructive discussion on open research problems and areas where we believe that more work is needed.
引用
收藏
页码:961 / 987
页数:27
相关论文
共 50 条
  • [21] A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
    Feng, Ruitao
    Chen, Sen
    Xie, Xiaofei
    Meng, Guozhu
    Lin, Shang-Wei
    Liu, Yang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1563 - 1578
  • [22] Consortium Blockchain-Based Malware Detection in Mobile Devices
    Gu, Jingjing
    Sun, Binglin
    Du, Xiaojiang
    Wang, Jun
    Zhuang, Yi
    Wang, Ziwang
    IEEE ACCESS, 2018, 6 : 12118 - 12128
  • [23] A Survey on Rise of Mobile Malware and Detection Methods
    Kalpana, S.
    Karthikeyan, S.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [24] Static Analysis of Android Malware Detection using Deep Learning
    Sandeep, H. R.
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICCS), 2019, : 841 - 845
  • [25] Towards a systematic description of the field using bibliometric analysis: malware evolution
    Mat, Sharfah Ratibah Tuan
    Ab Razak, Mohd Faizal
    Kahar, Mohd Nizam Mohmad
    Arif, Juliza Mohamad
    Mohamad, Salwana
    Firdaus, Ahmad
    SCIENTOMETRICS, 2021, 126 (03) : 2013 - 2055
  • [26] Hardware-Assisted Malware Detection for Embedded Systems in Smart Grid
    Li, Congmiao
    Srinivasan, Dipti
    Reindl, Thomas
    2015 IEEE INNOVATIVE SMART GRID TECHNOLOGIES - ASIA (ISGT ASIA), 2015,
  • [27] A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications
    Sikder, Amit Kumar
    Petracca, Giuseppe
    Aksu, Hidayet
    Jaeger, Trent
    Uluagac, A. Selcuk
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (02): : 1125 - 1159
  • [28] Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences
    Amro, Belal
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (01): : 18 - 24
  • [29] MalFire: Malware Firewall for Malicious Content Detection and Protection
    Yost, Wyatt
    Jaiswal, Chetan
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 428 - +
  • [30] Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices
    Arora, Anshul
    Garg, Shree
    Peddoju, Sateesh K.
    2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST), 2014, : 66 - 71