King's College London

Research portal

The Evolution of Android Malware and Android Analysis Techniques

Research output: Contribution to journalArticlepeer-review

Standard

The Evolution of Android Malware and Android Analysis Techniques. / Tam, Kimberly; Feizollah, Ali; Anuar, Nor Badrul; Salleh, Rosli; Cavallaro, Lorenzo.

In: COMPUTING SURVEYS, Vol. 49, No. 4, 06.02.2017, p. 1-41.

Research output: Contribution to journalArticlepeer-review

Harvard

Tam, K, Feizollah, A, Anuar, NB, Salleh, R & Cavallaro, L 2017, 'The Evolution of Android Malware and Android Analysis Techniques', COMPUTING SURVEYS, vol. 49, no. 4, pp. 1-41. https://doi.org/10.1145/3017427

APA

Tam, K., Feizollah, A., Anuar, N. B., Salleh, R., & Cavallaro, L. (2017). The Evolution of Android Malware and Android Analysis Techniques. COMPUTING SURVEYS, 49(4), 1-41. https://doi.org/10.1145/3017427

Vancouver

Tam K, Feizollah A, Anuar NB, Salleh R, Cavallaro L. The Evolution of Android Malware and Android Analysis Techniques. COMPUTING SURVEYS. 2017 Feb 6;49(4):1-41. https://doi.org/10.1145/3017427

Author

Tam, Kimberly ; Feizollah, Ali ; Anuar, Nor Badrul ; Salleh, Rosli ; Cavallaro, Lorenzo. / The Evolution of Android Malware and Android Analysis Techniques. In: COMPUTING SURVEYS. 2017 ; Vol. 49, No. 4. pp. 1-41.

Bibtex Download

@article{de4a1a4120c3489293325a65d6684271,
title = "The Evolution of Android Malware and Android Analysis Techniques",
abstract = "With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.",
author = "Kimberly Tam and Ali Feizollah and Anuar, {Nor Badrul} and Rosli Salleh and Lorenzo Cavallaro",
year = "2017",
month = feb,
day = "6",
doi = "10.1145/3017427",
language = "English",
volume = "49",
pages = "1--41",
journal = "COMPUTING SURVEYS",
issn = "0360-0300",
publisher = "Association for Computing Machinery (ACM)",
number = "4",

}

RIS (suitable for import to EndNote) Download

TY - JOUR

T1 - The Evolution of Android Malware and Android Analysis Techniques

AU - Tam, Kimberly

AU - Feizollah, Ali

AU - Anuar, Nor Badrul

AU - Salleh, Rosli

AU - Cavallaro, Lorenzo

PY - 2017/2/6

Y1 - 2017/2/6

N2 - With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.

AB - With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.

U2 - 10.1145/3017427

DO - 10.1145/3017427

M3 - Article

VL - 49

SP - 1

EP - 41

JO - COMPUTING SURVEYS

JF - COMPUTING SURVEYS

SN - 0360-0300

IS - 4

ER -

View graph of relations

© 2020 King's College London | Strand | London WC2R 2LS | England | United Kingdom | Tel +44 (0)20 7836 5454