File(s) under permanent embargo
Survey in smartphone malware analysis techniques
Smartphone Malware continues to be a serious threat in today's world. Recent research studies investigate the impacts of new malware variant. Historically traditional anti-malware analyses rely on the signatures of predefined malware samples. However, this technique is not resistant against the obfuscation techniques (e.g. polymorphic and metamorphic). While the permission system proposed by Google, requires smartphone users to pay attention to the permission description during the installation time. Nevertheless, normal users cannot comprehend the semantics of Android permissions. This chapter surveys various approaches used in Smartphone malware detection and Investigates weaknesses of existing countermeasures such as signature-based and anomaly-based detection.
History
Title of book
New Threats and Countermeasures in Digital Crime and Cyber TerrorismPagination
105 - 130Publisher DOI
ISBN-13
9781466683457ISBN-10
1466683457Publication classification
B Book chapter; B1 Book chapterCopyright notice
2015, IGI GlobalUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC