Infrastructure for detecting Android malware

4Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Malware for smartphones have sky-rocketed these last years, particularly for Android platforms. To tackle this threat, services such as Google Bouncer have intended to counter-attack. However, it has been of short duration since the malware have circumvented the service by changing their behaviors. Therefore, we propose a malware taxonomy, a survey of attack vectors to better understand the Android malware, a survey of the modus-operandi of attackers for infecting the smartphones, and the design of components that are responsible for analyzing and detecting Android malware of the NEMESYS infrastructure. This infrastructure aims at understanding and detecting attacks both at the network and smartphone level. © 2013 Springer International Publishing.

Cite

CITATION STYLE

APA

Delosières, L., & García, D. (2014). Infrastructure for detecting Android malware. In Lecture Notes in Electrical Engineering (Vol. 264 LNEE, pp. 389–398). Springer Verlag. https://doi.org/10.1007/978-3-319-01604-7_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free