2020
DOI: 10.3390/electronics9060942
|View full text |Cite
|
Sign up to set email alerts
|

Android Malware Family Classification and Analysis: Current Status and Future Directions

Abstract: Android receives major attention from security practitioners and researchers due to the influx number of malicious applications. For the past twelve years, Android malicious applications have been grouped into families. In the research community, detecting new malware families is a challenge. As we investigate, most of the literature reviews focus on surveying malware detection. Characterizing the malware families can improve the detection process and understand the malware patterns. For this reason, we conduc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(33 citation statements)
references
References 71 publications
(181 reference statements)
0
33
0
Order By: Relevance
“…For Android, the kill switch was used by Google, but the challenge remains that the kill switch will not be effective if an earlier download has an infection on the device. iPhone/FindAndCall [35] and Android/ DroidKungFu [36] malware snip individual data and forward this personal information to remote network servers. Other malicious software such as FinSpy, Android/Nickispy, and Android/Spybubble have been developed to record mobile phone calls, send SMS, and monitor mobile location as spy instruments.…”
Section: A History Of Mobile Malwarementioning
confidence: 99%
See 1 more Smart Citation
“…For Android, the kill switch was used by Google, but the challenge remains that the kill switch will not be effective if an earlier download has an infection on the device. iPhone/FindAndCall [35] and Android/ DroidKungFu [36] malware snip individual data and forward this personal information to remote network servers. Other malicious software such as FinSpy, Android/Nickispy, and Android/Spybubble have been developed to record mobile phone calls, send SMS, and monitor mobile location as spy instruments.…”
Section: A History Of Mobile Malwarementioning
confidence: 99%
“…Secure communications and transactions on malicious applications as software packages became a business of interest on forums and vendor online shops [62], [63], [64]. Different Android malware families include Rumms, Krep, Triada, Descarga, Mazar_Bot, Rootnik, AndroidOS.Fusob, and DroidJack emerged in 2016 [65][66][67]. According to the mobile security report by Mead et al [68], AndroidOS.Fusob Trojan ransomware was the most popular and persistent android malicious program in 2016 that infected users in different geographical locations including the UK, US, China, and Germany.…”
Section: Dark Web Advancement and New Malware Variantmentioning
confidence: 99%
“…To determine the risks, an analysis of the attack vectors and existing attacks that can be produced on the Android ecosystem is carried out in different studies [57], [58]. In the analysis, malicious attacks as well as not-fully malicious attacks (e.g., collecting sensitive user' information) were considered [59].…”
Section: Aranac: Application Risk Assessment Based Network Access Controlmentioning
confidence: 99%
“…Due to the increasing number of mobile malware instances and the emergence of new malware families, malware has become a serious threat to Android ecosystem security. To defeat this threat and protect mobile users and systems, many studies have investigated the detection and classification of Android malware samples [2]- [17]. Malware detection is a binary classification problem that involves attempting to determine whether a suspicious app is malicious or benign.…”
Section: Introductionmentioning
confidence: 99%