Survey in smartphone malware analysis techniques

Alazab, Moutaz and Batten, Lynn M. 2015, Survey in smartphone malware analysis techniques. In Dawson, Maurice and Omar, Marwan (ed), New threats and countermeasures in digital crime and cyber terrorism, IGI Global, Hershey, Pa., pp.105-130, doi: 10.4018/978-1-4666-8345-7.ch007.

Attached Files
Name Description MIMEType Size Downloads

Title Survey in smartphone malware analysis techniques
Author(s) Alazab, Moutaz
Batten, Lynn M.ORCID iD for Batten, Lynn M. orcid.org/0000-0003-4525-2423
Title of book New threats and countermeasures in digital crime and cyber terrorism
Editor(s) Dawson, Maurice
Omar, Marwan
Publication date 2015
Chapter number 7
Total chapters 16
Start page 105
End page 130
Total pages 26
Publisher IGI Global
Place of Publication Hershey, Pa.
Summary Smartphone Malware continues to be a serious threat in today's world. Recent research studies investigate the impacts of new malware variant. Historically traditional anti-malware analyses rely on the signatures of predefined malware samples. However, this technique is not resistant against the obfuscation techniques (e.g. polymorphic and metamorphic). While the permission system proposed by Google, requires smartphone users to pay attention to the permission description during the installation time. Nevertheless, normal users cannot comprehend the semantics of Android permissions. This chapter surveys various approaches used in Smartphone malware detection and Investigates weaknesses of existing countermeasures such as signature-based and anomaly-based detection.
ISBN 1466683457
9781466683464
Language eng
DOI 10.4018/978-1-4666-8345-7.ch007
Field of Research 080503 Networking and Communications
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category B1 Book chapter
ERA Research output type B Book chapter
Copyright notice ©2015, IGI Global
Persistent URL http://hdl.handle.net/10536/DRO/DU:30084094

Document type: Book Chapter
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 1 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 299 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Wed, 08 Jun 2016, 17:05:54 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.