Deakin University
Browse

File(s) under permanent embargo

Survey in smartphone malware analysis techniques

chapter
posted on 2015-04-30, 00:00 authored by M Alazab, Lynn BattenLynn Batten
Smartphone Malware continues to be a serious threat in today's world. Recent research studies investigate the impacts of new malware variant. Historically traditional anti-malware analyses rely on the signatures of predefined malware samples. However, this technique is not resistant against the obfuscation techniques (e.g. polymorphic and metamorphic). While the permission system proposed by Google, requires smartphone users to pay attention to the permission description during the installation time. Nevertheless, normal users cannot comprehend the semantics of Android permissions. This chapter surveys various approaches used in Smartphone malware detection and Investigates weaknesses of existing countermeasures such as signature-based and anomaly-based detection.

History

Title of book

New Threats and Countermeasures in Digital Crime and Cyber Terrorism

Pagination

105 - 130

ISBN-13

9781466683457

ISBN-10

1466683457

Publication classification

B Book chapter; B1 Book chapter

Copyright notice

2015, IGI Global

Usage metrics

    Research Publications

    Categories

    No categories selected

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC