The Evolution of Android Malware and Android Analysis Techniques

Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro

Research output: Contribution to journalArticlepeer-review

240 Citations (Scopus)
1330 Downloads (Pure)

Abstract

With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.
Original languageEnglish
Pages (from-to)1-41
Number of pages41
JournalCOMPUTING SURVEYS
Volume49
Issue number4
DOIs
Publication statusPublished - 6 Feb 2017

Fingerprint

Dive into the research topics of 'The Evolution of Android Malware and Android Analysis Techniques'. Together they form a unique fingerprint.

Cite this