IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Survey in Smartphone Malware Analysis Techniques

Survey in Smartphone Malware Analysis Techniques
View Sample PDF
Author(s): Moutaz Alazab (Isra University, Jordan)and Lynn M. Batten (Deakin University, Australia)
Copyright: 2015
Pages: 26
Source title: New Threats and Countermeasures in Digital Crime and Cyber Terrorism
Source Author(s)/Editor(s): Maurice Dawson (Illinois Institute of Technology, USA)and Marwan Omar (Nawroz University, Iraq)
DOI: 10.4018/978-1-4666-8345-7.ch007

Purchase

View Survey in Smartphone Malware Analysis Techniques on the publisher's website for pricing and purchasing information.

Abstract

Smartphone Malware continues to be a serious threat in today's world. Recent research studies investigate the impacts of new malware variant. Historically traditional anti-malware analyses rely on the signatures of predefined malware samples. However, this technique is not resistant against the obfuscation techniques (e.g. polymorphic and metamorphic). While the permission system proposed by Google, requires smartphone users to pay attention to the permission description during the installation time. Nevertheless, normal users cannot comprehend the semantics of Android permissions. This chapter surveys various approaches used in Smartphone malware detection and Investigates weaknesses of existing countermeasures such as signature-based and anomaly-based detection.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom