Open Access   Article Go Back

Android Malicious apps and Malware Security: A Review

Vishal Kumar Gujare1 , Praveen Malviya2

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 43-47, Apr-2016

Online published on Apr 27, 2016

Copyright © Vishal Kumar Gujare , Praveen Malviya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vishal Kumar Gujare , Praveen Malviya, “Android Malicious apps and Malware Security: A Review,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.43-47, 2016.

MLA Style Citation: Vishal Kumar Gujare , Praveen Malviya "Android Malicious apps and Malware Security: A Review." International Journal of Computer Sciences and Engineering 4.4 (2016): 43-47.

APA Style Citation: Vishal Kumar Gujare , Praveen Malviya, (2016). Android Malicious apps and Malware Security: A Review. International Journal of Computer Sciences and Engineering, 4(4), 43-47.

BibTex Style Citation:
@article{Gujare_2016,
author = {Vishal Kumar Gujare , Praveen Malviya},
title = {Android Malicious apps and Malware Security: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {43-47},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=854},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=854
TI - Android Malicious apps and Malware Security: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Vishal Kumar Gujare , Praveen Malviya
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 43-47
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1768 1543 downloads 1473 downloads
  
  
           

Abstract

Smartphones are becoming the important devices for us in the post-PC era, which aid in our daily tasks with the useful functionalities such as Internet, GPS, cameras, NFC (Near Field Communication) and accelerometers. Millions of users are using android phones and android application is becoming more and more popular. Among all the mobile platforms available, Android has become the more targeted one. The exponential growth of the Android platform in the recent years has made it a main target of cyber-criminals. As a result, the amount of malware for Android is constant and rapidly growing. This exponential growth of malware given, there is a need for new detection models designed to specifically target Android malware in order to better protect the end-users and, eventually, to counter the rise of Android malware itself. This is probably due to the fact that Android is the most widespread platform and to some technical particularities, such as the fact that Android applications are really easy to reverse engineer and to modify/repackage. This paper focus on the survey of security threats in Android platform. We gives the survey on malware and malicious applications in Android.

Key-Words / Index Term

Smartphone, Android, Malicious applications, Security, Malware

References

[1] BHAS N. Press Release: More Than 80% of Smartphones Remain Unprotected from Malware and Attacks, Juniper Research Finds [EB/OL].[2014-02-23].http://www.juniperresearch.com/viewpressrelease.php?pr=404.
[2] D. Research. (2013). Global Smartphone Shipments to Reach 1.24 Billion in 2014. [Online]. Available: http://www.digitimes.com/news/a20131125PD218.html
[3] I. D. Corporation. (2013). Android Pushes Past 80% Market Share While Windows Phone Shipments Leap 156.0% Year Over Year in the Third Quarter, According to IDC. [Online]. Available:http://www.idc.com/getdoc.jsp?containerId=prUS24442013
[4] H. Peng et al., “Using probabilistic generative models for ranking risks of Android apps,” in Proc. ACM Conf. CCS, 2012, pp. 241–252.
[5] BARRERA D, KAYACIK H G, OORSCHOT P C V, et al. A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android[C]//Proceedings of the 17th ACM Conference on Computer and Communications Security: Oct 4-8, 2010, Chicago, Illinois, USA: ACM, 2010: 73-84.
[6] FELT A P, GREENWOOD K, WAGNER D. TheEffectiveness of Application Permissions[C]//Proceedings of the 2nd USENIX Conference on Web Application Development: Jun 15-16, 2011, Portland, Oregon, USA: USENIX Association, 2011: 7-7.
[7] FELT A P, HA E, EGELMAN S, et al. Android Permissions: User Attention, Comprehension, and Behavior[C]//Proceedings of the 8th Symposium on Usable Privacy and Security: Jul 11-13, 2012, Washington, D.C., USA: ACM, 2012: 1-14.
[8] CHEN Y, XU H, ZHOU Y, et al. Is This App Safefor Children?: A Comparison Study of Maturity Ratings on Android and Ios Applications[C]//Proceedings of the 22nd International Conference on World Wide Web: May 13-17, 2013, Rio de Janeiro, Brazil: International World Wide Web Conferences Steering Committee, 2013: 201-212.
[9] ZHOU Y, JIANG X. Dissecting Android Malware: Characterization and Evolution[C]//Proceedings of the 2012 IEEE Symposium on Security and Privacy: May 21-23, 2012, San Francisco, California, USA: IEEE Computer Society, 2012: 95-109.
[10] B. Uscilowski. (2013). Symantac White Paper: Mobile Adware and Malware Analysis. [Online]. Available: symantec.com/content/en/us/enterprise/media/security_response/whitepapers/madware_and_malware_analysis.pdf
[11] Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, and Xiangliang Zhang, Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 11, NOVEMBER 2014, pp-1869-1883
[12] B. P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy, “Android permissions: A perspective combining risks and benefits,” in Proc. 17th ACM SACMAT, 2012, pp. 13–22.
[13] XIONG Ping, WANG Xiaofeng, NIU Wenjia, ZHU Tianqing, LI Gang, Android Malware Detection with Contrasting Permission Patterns, PROTECTING COMMUNICATIONS INFRASTRUCTURE AGAINST CYBER ATTACKS, IEEE 2014, pp-1-14
[14] R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, “WHYPER: Towards automating risk assessment of mobile applications,” in Proc. 22nd USENIX Secur. Symp., 2013, pp. 527–542.
[15] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of Android application security,” in Proc. 20th USENIX Secur. Symp., 2011,p. 21.