The Android malware detection systems between hope and reality

作者: Khaled Bakour , Halil Murat Ünver , Razan Ghanem

DOI: 10.1007/S42452-019-1124-X

关键词:

摘要: The widespread use of Android-based smartphones made it an important target for malicious applications’ developers. So, a large number frameworks have been proposed to tackle the huge daily published malwares. Despite there are many review papers that conducted in order shed light on works achieved Android malware analysing domain, do not fit with importance this research field and volume works. Also, is no comprehensive taxonomy all trends applications targeting system. Furthermore, none existing contains schematic model makes easy reader know methods methodologies used particular without much effort. This paper aims at proposing suggesting new approach. To end, between 2009 2019 has conducted. study includes more than 200 different goals such as apps’ behaviour analysis, automatic user interface triggers or packer/unpacker development. so most previous can be classified under it. best our knowledge, suggested widest terms covered trends. Moreover, we detailed (called Schematic Review Model) illustrates process detecting malignant studied taxonomy. first time detection explained way amount detail. researches analysed according multiple criteria method, features, dataset. features were discussed detail by dividing into classes. challenges facing Android’s Finally, concluded gaps size goal apps every day, some future areas discussed.

参考文章(223)
Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra, MADAM: A Multi-level Anomaly Detector for Android Malware Lecture Notes in Computer Science. pp. 240- 253 ,(2012) , 10.1007/978-3-642-33704-8_21
Borja Sanz, Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Pablo Garcia Bringas, Gonzalo Álvarez, PUMA: Permission Usage to Detect Malware in Android CISIS/ICEUTE/SOCO Special Sessions. pp. 289- 298 ,(2013) , 10.1007/978-3-642-33018-6_30
Tao Xie, Rahul Pandita, William Enck, Xusheng Xiao, Wei Yang, WHYPER: towards automating risk assessment of mobile applications usenix security symposium. pp. 527- 542 ,(2013)
Britton Wolfe, Karim O. Elish, Danfeng Yao, Comprehensive Behavior Profiling for Proactive Android Malware Detection international conference on information security. pp. 328- 344 ,(2014) , 10.1007/978-3-319-13257-0_19
Heqing Huang, Sencun Zhu, Peng Liu, Dinghao Wu, A Framework for Evaluating Mobile App Repackaging Detection Algorithms Trust and Trustworthy Computing. pp. 169- 186 ,(2013) , 10.1007/978-3-642-38908-5_13
Clint Gibler, Jonathan Crussell, Jeremy Erickson, Hao Chen, AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale trust and trustworthy computing. pp. 291- 307 ,(2012) , 10.1007/978-3-642-30921-2_17
Min Zheng, Patrick P. C. Lee, John C. S. Lui, ADAM: an automatic and extensible platform to stress test android anti-virus systems international conference on detection of intrusions and malware and vulnerability assessment. pp. 82- 101 ,(2012) , 10.1007/978-3-642-37300-8_5
Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo, CRePE: context-related policy enforcement for android international conference on information security. ,vol. 6531, pp. 331- 345 ,(2010) , 10.1007/978-3-642-18178-8_29
Machigar Ongtang, Stephen McLaughlin, William Enck, Patrick McDaniel, Semantically rich application-centric security in Android Security and Communication Networks. ,vol. 5, pp. 658- 673 ,(2012) , 10.1002/SEC.360
Martina Lindorfer, Matthias Neugschwandtner, Christian Platzer, None, MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis computer software and applications conference. ,vol. 2, pp. 422- 433 ,(2015) , 10.1109/COMPSAC.2015.103