2012 7th International Conference on Malicious and Unwanted Software 2012
DOI: 10.1109/malware.2012.6461012
|View full text |Cite
|
Sign up to set email alerts
|

Smartphone malware detection: From a survey towards taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 31 publications
(31 citation statements)
references
References 17 publications
0
31
0
Order By: Relevance
“…Amamra et al [7] performed a survey on malware detection approaches highlighting two broader classes of malware detection: signature and anomalybased. Porter et al [6] performed a survey on malicious characteristics for mobile device malware.…”
Section: Content Leakage and Malwarementioning
confidence: 99%
See 1 more Smart Citation
“…Amamra et al [7] performed a survey on malware detection approaches highlighting two broader classes of malware detection: signature and anomalybased. Porter et al [6] performed a survey on malicious characteristics for mobile device malware.…”
Section: Content Leakage and Malwarementioning
confidence: 99%
“…To date, most research work has been devoted to understand Android malware behaviors for classification [6][7][8] and detection [9][10][11][12][13][14][15][16] purposes. However, very few research efforts [17][18][19] have addressed the issue of content provider leakage vulnerabilities and their automatic detection.…”
Section: Introductionmentioning
confidence: 99%
“…The detection is based on analyzing the malware program responsible for performing the SMS-based attack. The proposed solutions have been classified as signature-based approach and anomaly-based approach [8].…”
Section: Related Workmentioning
confidence: 99%
“…Thereby, the need of malware detection tool is now more curial. Smartphone malware detection techniques are classified broadly into two main classes: signature-based and anomaly-based [2]. Signature-based techniques look for patterns that match with malware patterns in their database.…”
Section: Introductionmentioning
confidence: 99%
“…Signature-based techniques look for patterns that match with malware patterns in their database. Anomaly-based techniques maintain normal behavior profiles and any deviation from these profiles is considered malicious [2]. The main advantage of anomaly detection techniques is the ability to detect unknown malwares.…”
Section: Introductionmentioning
confidence: 99%