Skip to main content

Detection and Classification of Malwares in Mobile Applications

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 37))

Abstract

Android is the most widely used as mobile operation system, the thing that make it the target of many attackers, day by day the market of malicious applications develop and grow to reach every applications store. In this purpose many researches have been made to deal with threats through proposing different malware detection techniques. The main objective of this thesis is to detect malwares in android mobiles by applying reverse engineering techniques to unpack malicious apps code and classify them in order to detect whether the app is malicious or not. This paper aims to give a comprehensive account of proposed techniques to detect and classify malicious applications in android mobiles based on machine learning algorithms and a comparison between those techniques in order to conclude the most efficient one and their limitations with a view to ameliorate them.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Junaid, M., Liu, D., Kung, D.: Dexteroid: detecting malicious behaviors in Android apps using reverse-engineered life cycle models. Comput. Secur. 59, 92–117 (2016). https://doi.org/10.1016/j.cose.2016.01.008

    Article  Google Scholar 

  2. Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Download malware? No, thanks. How formal methods can block update attacks (2016)

    Google Scholar 

  3. Narayanan, A., Yang, L., Chen, L., Jinliang, L.: Adaptive and scalable android malware detection through online learning. ArXiv160607150 Cs (2016)

    Google Scholar 

  4. Yerima, S.Y., Sezer, S., McWilliams, G., Muttik, I.: A new android malware detection approach using Bayesian classification. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Application (AINA)

    Google Scholar 

  5. Pektaş, A., Çavdar, M., Acarman, T.: Android malware classification by applying online machine learning, pp. 72–80 (2016)

    Google Scholar 

  6. Dash, S., Suarez-Tangil, G., Khan, S., et al.: DroidScribe: classifying android malware based on runtime behavior (2016)

    Google Scholar 

  7. Jang, J., Yun, J., Mohaisen, A., et al.: Detecting and classifying method based on similarity matching of Android malware behavior with profile. SpringerPlus 5 (2016). https://doi.org/10.1186/s40064-016-1861-x

  8. Malik, S., Khatter, K.: System call analysis of Android malware families. Indian J. Sci. Technol. 9 (2016). https://doi.org/10.17485/ijst/2016/v9i21/90273

  9. Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: EMULATOR vs. REAL PHONE: Android malware detection using machine learning. ArXiv170310926 Cs, pp. 65–72. https://doi.org/10.1145/3041008.3041010

  10. Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. 103, 22–31 (2017). https://doi.org/10.1016/j.jpdc.2016.10.012

    Article  Google Scholar 

  11. Kapratwar, A.: Static and dynamic analysis for Android malware detection. Masters projects (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soussi Ilham .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ilham, S., Ghadi, A. (2018). Detection and Classification of Malwares in Mobile Applications. In: Ben Ahmed, M., Boudhir, A. (eds) Innovations in Smart Cities and Applications. SCAMS 2017. Lecture Notes in Networks and Systems, vol 37. Springer, Cham. https://doi.org/10.1007/978-3-319-74500-8_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74500-8_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74499-5

  • Online ISBN: 978-3-319-74500-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics