2017
DOI: 10.5121/ijmnct.2017.7601
|View full text |Cite
|
Sign up to set email alerts
|

Malware Detection Techniques for Mobile Devices

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 3 publications
(4 reference statements)
0
6
0
Order By: Relevance
“…Recently, this work was extended by Svajlenko and Roy [13] to include more clone detection tools. Amro [14] summarized most of the malware detection techniques used by Android and iOS, and he presented a brief description of each technique. Tchakounté et al [15] proposed an Android malware detection tool, LimonDroid, and they tested the tool with tens of malicious and benign apps.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, this work was extended by Svajlenko and Roy [13] to include more clone detection tools. Amro [14] summarized most of the malware detection techniques used by Android and iOS, and he presented a brief description of each technique. Tchakounté et al [15] proposed an Android malware detection tool, LimonDroid, and they tested the tool with tens of malicious and benign apps.…”
Section: Related Workmentioning
confidence: 99%
“…In conclusion, obfuscators have not attracted the attention of sufficient researchers. Most attempts have focused on a small number of obfuscators [1,11,12,[14][15][16]. Others narrowed their research to specific types of obfuscators, such as plagiarism/cloning [6,13,17], network protocols [10], or JavaScript [1].…”
Section: Related Workmentioning
confidence: 99%
“…This type of analysis can be divided into signature-based analysis, permission-based analysis, and virtual machine analysis. It is based on the reliance of analyzing the source code [24]. A static analysis of Android malware detection is applied using AndroidManifest.xml, smali files, and a set of static features including permissions, API calls, Dalvik opcode, and other components, which can be obtained by decompiling the APK files, the main objective for analysis [5].…”
Section: Static and Dynamic Analysismentioning
confidence: 99%
“…Grisham et al [19] have used recurrent neural networks to identify the infected attachments and then carry the social network analysis for finding the key hackers disseminating from mobile devices. Amro [20] have analyzed different malware detection techniques that suit mobile operating systems like Android and iOS. Azar et al [21] have presented a method, "analytics," that focuses on extracting static features of any binary file to distinguish malware.…”
Section: Related Workmentioning
confidence: 99%