The Evolution of Android Malware and Android Analysis Techniques
dc.contributor.author | Tam, K | |
dc.contributor.author | Feizollah, A | |
dc.contributor.author | Anuar, NB | |
dc.contributor.author | Salleh, R | |
dc.contributor.author | Cavallaro, L | |
dc.date.accessioned | 2020-07-16T14:17:08Z | |
dc.date.available | 2020-07-16T14:17:08Z | |
dc.date.issued | 2017-01-13 | |
dc.identifier.issn | 0360-0300 | |
dc.identifier.issn | 1557-7341 | |
dc.identifier.other | ARTN 76 | |
dc.identifier.uri | http://hdl.handle.net/10026.1/16065 | |
dc.description | Publisher policy: author can archive post-print on institutional repository. Publisher's version/PDF cannot be used. Publisher copyright and source must be acknowledged. Must link to publisher version with statement that this is the definitive version and DOI. Must state that version on repository is the authors version | |
dc.description.abstract |
<jats:p>With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.</jats:p> | |
dc.format.extent | 1-41 | |
dc.language | en | |
dc.language.iso | en | |
dc.publisher | Association for Computing Machinery (ACM) | |
dc.subject | Android | |
dc.subject | malware | |
dc.subject | static analysis | |
dc.subject | dynamic analysis | |
dc.subject | detection | |
dc.subject | classification | |
dc.title | The Evolution of Android Malware and Android Analysis Techniques | |
dc.type | journal-article | |
dc.type | Journal Article | |
plymouth.author-url | https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000399116400017&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008 | |
plymouth.issue | 4 | |
plymouth.volume | 49 | |
plymouth.publication-status | Published | |
plymouth.journal | ACM Computing Surveys | |
dc.identifier.doi | 10.1145/3017427 | |
plymouth.organisational-group | /Plymouth | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering | |
plymouth.organisational-group | /Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA | |
plymouth.organisational-group | /Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics | |
plymouth.organisational-group | /Plymouth/Users by role | |
plymouth.organisational-group | /Plymouth/Users by role/Academics | |
dcterms.dateAccepted | 2016-11-01 | |
dc.identifier.eissn | 1557-7341 | |
dc.rights.embargoperiod | Not known | |
rioxxterms.versionofrecord | 10.1145/3017427 | |
rioxxterms.licenseref.uri | http://www.rioxx.net/licenses/all-rights-reserved | |
rioxxterms.licenseref.startdate | 2017-01-13 | |
rioxxterms.type | Journal Article/Review |