Understanding the Root of Attack in Android Malware

被引:0
作者
Romli, Rahiwan Nazar [1 ]
Zolkipli, Mohamad Fadli [1 ]
Al-Ma'arif, Ahmad [2 ]
Ramli, Muhamad Ramiza [1 ]
Salamat, Mohamad Aizi [3 ]
机构
[1] Univ Malaysia Pahang, Fac Comp Syst & Software Engn, Gambang 26200, Malaysia
[2] Telkom Univ, Sch Ind Engn, Bandung 40257, West Java, Indonesia
[3] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Batu Pahat 86400, Johor, Malaysia
来源
INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING | 2018年 / 10卷 / 06期
关键词
Android; Malware; Malware Detection and Analysis;
D O I
10.30880/ijie.2018.10.06.029
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid pace of development and change in mobile device technology and Android versions, Android malware has emerged and become a focus in current research. Subsequently, security and privacy have become one of the main issues in android malware. Therefore, it is essential to understand the behavior of Android malware in order to conceive an effective technique in malware detection and analysis. This article presents a comprehensive study regarding Android platform, its features in android malware code and also discusses the result from previous studies in order to support forward-looking in Android study.
引用
收藏
页码:203 / 208
页数:6
相关论文
共 22 条
[1]  
Alam S., 2014, ACM INT C P SER, V2014
[2]  
Andrejkova G., 2013, APPROXIMATE PATTERN, V1003, P52
[3]   Malware analysis performance enhancement using cloud computing [J].
Barakat, Osamah L. ;
Hashim, Shaiful J. ;
Abdullah, Raja Syamsul Azmir B. Raja ;
Ramli, Abdul Rahman ;
Hashim, Fazirulhisyam ;
Samsudin, Khairulmizam ;
Ab Rahman, Mahmud .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2014, 10 (01) :1-10
[4]  
Brahler S., 2010, ANAL ANDROID ARCHITE, P52
[5]   Android: Changing the Mobile Landscape [J].
Butler, Margaret .
IEEE PERVASIVE COMPUTING, 2011, 10 (01) :4-7
[6]  
Chalise B., 2015, ANDROID PERMISSION
[7]  
Ericsson, 2016, MOB REP, P7
[8]   Mining Permission Request Patterns from Android and Facebook Applications [J].
Frank, Mario ;
Dong, Ben ;
Felt, Adrienne Porter ;
Song, Dawn .
12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012), 2012, :870-875
[9]  
Gismalla MSM, 2017, INT J INTEGR ENG, V9, P118
[10]  
Malwarebytes, 2017, STAT MALW REP, P11