2021
DOI: 10.13052/jcsm2245-1439.1017
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead

Abstract: Smartphones usage have become ubiquitous in modern life serving as a double-edged sword with opportunities and challenges in it. Along with the benefits, smartphones also have high exposure to malware. Malware has progressively penetrated thereby causing more turbulence. Malware authors have become increasingly sophisticated and are able to evade detection by anti-malware engines. This has led to a constant arms race between malware authors and malware defenders. This survey converges on Android malware and co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 116 publications
(181 reference statements)
0
9
0
Order By: Relevance
“…To evade malware detection systems, malicious software developers usually imply small modifications on the original source code of the malware app to generate new malicious software variants. In consequence, identifying the new malicious software variants becomes challenging even if they belong to the same family [3].…”
Section: Introductionmentioning
confidence: 99%
“…To evade malware detection systems, malicious software developers usually imply small modifications on the original source code of the malware app to generate new malicious software variants. In consequence, identifying the new malicious software variants becomes challenging even if they belong to the same family [3].…”
Section: Introductionmentioning
confidence: 99%
“…Various surveys were conducted on problem-space evasion attacks, e.g. [22,23,24,25,26,27,28,29,30,31,32,33,34]. However, some of these surveys are general and therefore do not focus on a specific domain of evasion attacks [23,27,28,30,32,33].…”
Section: Introductionmentioning
confidence: 99%
“…Other surveys analyze domains other than Android OS, such as adversarial network examples, Windows PEs, Natural Language Processing, and images [22,24,25,26,29]. Several surveys focused on evasion attacks on the Android OS domain, for example [35,31,34]. While Bhusal and Rastogi [35] presented work on the nature of feature-space and problem-space attacks, they only explored one problem-space evasion attack.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Consequently, the identification process of Android malware attacks from the same malware family becomes tremendously challenging [ 5 ]. Therefore, efficient Android malware detection algorithms based on smart artificial intelligence (AI) tools need to be developed and implemented to identify and recognize the harmful effect of Android malware threats [ 6 , 7 ].…”
Section: Introductionmentioning
confidence: 99%