2014
DOI: 10.1109/surv.2013.070813.00214
|View full text |Cite
|
Sign up to set email alerts
|

Smartphone Malware and Its Propagation Modeling: A Survey

Abstract: Smartphones are pervasively used in society, and have been both the target and victim of malware writers. Motivated by the significant threat that presents to legitimate users, we survey the current smartphone malware status and their propagation models. The content of this paper is presented in two parts. In the first part, we review the short history of mobile malware evolution since 2004, and then list the classes of mobile malware and their infection vectors. At the end of the first part, we enumerate the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
73
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 153 publications
(74 citation statements)
references
References 56 publications
0
73
0
1
Order By: Relevance
“…Zolkipli et al [41] offers seventeen classes of classification based on form of existence. Peng at al [42] in their survey of smartphone malware highlights five classes of malware based on a matrix on propagation factors, existence form and risk. Based on review of malware literature, classification of malware in IoT will follow the classical classification.…”
Section: Malware Definition and Characterizationmentioning
confidence: 99%
See 3 more Smart Citations
“…Zolkipli et al [41] offers seventeen classes of classification based on form of existence. Peng at al [42] in their survey of smartphone malware highlights five classes of malware based on a matrix on propagation factors, existence form and risk. Based on review of malware literature, classification of malware in IoT will follow the classical classification.…”
Section: Malware Definition and Characterizationmentioning
confidence: 99%
“…Virus: Is a type of malware that gain access to the device or software without user knowledge and duplicates itself or commits the programmed malicious task. Viruses cannot exist on their own therefore require a carrier to propagate [42] which makes it hard to survive in sensors and actuators. b. Worms: It gain access to systems without owner's permission and operates stealthily with capability to duplicate into thousands of copies.…”
Section: Malware Definition and Characterizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Aunque este es un escenario hipotético y el malware, así como la aplicación deals4U, son ficticios, no es descabellado que ataques de este tipo pudieran producirse (o se estén produciendo) sin que el usuario lo perciba [13].…”
Section: A Malware Social -La Tienda Del Barriounclassified