2019
DOI: 10.1016/j.future.2019.03.007
|View full text |Cite
|
Sign up to set email alerts
|

Mobile malware attacks: Review, taxonomy & future directions

Abstract: A pervasive increase in the adoption rate of smartphones with Android OS is noted in recent years. Android's popular and attractive environment not only captured the attention of users but also increased security concerns. As a result, Android malware detection is one of the sizzling topics in the mobile security domain. This paper provides a comprehensive review of state-of-the-art mobile malware attacks, vulnerabilities, detection techniques and security solutions over the period of 2013-2019 that majorly ta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
82
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 140 publications
(84 citation statements)
references
References 82 publications
(103 reference statements)
0
82
0
2
Order By: Relevance
“…The dynamic analysis focuses mainly on running time and interactive features of apps, therefore it is more complex and slower than the static analysis. The usability of dynamic analysis, in fact, lies in the ability to detect "obfuscated" and "polymorphic" malware which mostly escapes under static analysis [4]. Finding optimum running time for dynamic analysis is also difficult, as the start of malicious activities can vary from sample to sample [32].…”
Section: Static Features-based Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…The dynamic analysis focuses mainly on running time and interactive features of apps, therefore it is more complex and slower than the static analysis. The usability of dynamic analysis, in fact, lies in the ability to detect "obfuscated" and "polymorphic" malware which mostly escapes under static analysis [4]. Finding optimum running time for dynamic analysis is also difficult, as the start of malicious activities can vary from sample to sample [32].…”
Section: Static Features-based Detectionmentioning
confidence: 99%
“…Finding optimum running time for dynamic analysis is also difficult, as the start of malicious activities can vary from sample to sample [32]. The dynamic features are extracted through system calls, network activities, user interaction, Central Processing Unit (CPU) consumption, and other phone activities [4]. Table 3 lists and summarizes some of the popular works related to dynamic analysis using dynamic features and ML-based Android Malware detection (Input/Output (I/O), Read/Write (R/W)).…”
Section: Static Features-based Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Zararlı yazılım saldırıları hedefli veya hedefsiz olmak üzere iki çeşit yöntemle tasarlanmaktadır. Hedefsiz otomatik siber saldırılar çoğunlukla web tabanlı olduğundan kullanıcıyla etkileşimine gerek duymaktadırlar [Man-in-the-Browser gibi] (Öztürk, 2018;Qamar, Karim, & Chang, 2019;Vinay, & Kok, 2018;Jain, vd. 2014).…”
Section: Uzaktan Erişim Truva Atlarının Sızma Yöntemleriunclassified
“…Companies acquire network protection solutions (IDS, firewalls, honeypots etc..) to mitigate spear-phishing intrusion [24,25]. At the employee level, they opt for antiviruses [49,50] or filters based on black and white lists installed on browsers [20][21][22][23]. Training sessions with tools simulating real attacks are planned and educational games [16][17][18][19] set up for this purpose are used in short or long term.…”
Section: Prevention and Mitigation Approachesmentioning
confidence: 99%