Android anti-malware techniques and its vulnerabilities: A survey

7Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Android was initially presented in 2008, and luckily it has pulled in countless customers inside to make use of its services exhaustively. Utilization of Android gadgets is consistently expanding at colossal rate. As per Gartner’s report, in the cell phone working framework (OS) market, Google’s Android broadened its lead by catching 82% of the aggregate market in the final quarter of 2016. As per a report, the quantity of mobile applications in the Google Play Store had now outperformed a check of 2.5 million applications and all are accessible for download. Advanced features have been giving the clients simplicity of person-to-person communication, managing an account, i.e., making user to transfer money around the globe. As versatile applications are increasing, thereby expanding prominence among clients, and at the same time protection and security of smartphone clients turn into a worry, its open-source nature has turned into a fascination point for spammers and malware creators to perform unintended errands. Scholastic analysts and anti-malware organizations have understood that the static investigation strategies are helpless. Specifically, the common stealth strategies, for example, encryption and code obfuscation, are equipped for creating variations of known malware. This has prompted the utilization of dynamic examination-based strategies. Since a solitary approach might be incapable against the propelled procedures, numerous corresponding methodologies can be utilized as a part of pair for powerful malware discovery. This article gives an understanding into the qualities and inadequacies of the known anti-malware techniques from year 2009 to 2017. Our contribution to this paper is we have framed comparative study of various techniques and have provide major research gaps in summarized way which gives a stage, to the scientists and specialists, toward proposing the cutting-edge Android security, examination, and malware discovery methods.

Cite

CITATION STYLE

APA

Thakur, D., Gera, T., & Singh, J. (2019). Android anti-malware techniques and its vulnerabilities: A survey. In Advances in Intelligent Systems and Computing (Vol. 669, pp. 315–328). Springer Verlag. https://doi.org/10.1007/978-981-10-8968-8_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free