Abstract
Android is the most widely used as mobile operation system, the thing that make it the target of many attackers, day by day the market of malicious applications develop and grow to reach every applications store. In this purpose many researches have been made to deal with threats through proposing different malware detection techniques. The main objective of this thesis is to detect malwares in android mobiles by applying reverse engineering techniques to unpack malicious apps code and classify them in order to detect whether the app is malicious or not. This paper aims to give a comprehensive account of proposed techniques to detect and classify malicious applications in android mobiles based on machine learning algorithms and a comparison between those techniques in order to conclude the most efficient one and their limitations with a view to ameliorate them.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Junaid, M., Liu, D., Kung, D.: Dexteroid: detecting malicious behaviors in Android apps using reverse-engineered life cycle models. Comput. Secur. 59, 92–117 (2016). https://doi.org/10.1016/j.cose.2016.01.008
Mercaldo, F., Nardone, V., Santone, A., Visaggio, C.A.: Download malware? No, thanks. How formal methods can block update attacks (2016)
Narayanan, A., Yang, L., Chen, L., Jinliang, L.: Adaptive and scalable android malware detection through online learning. ArXiv160607150 Cs (2016)
Yerima, S.Y., Sezer, S., McWilliams, G., Muttik, I.: A new android malware detection approach using Bayesian classification. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Application (AINA)
Pektaş, A., Çavdar, M., Acarman, T.: Android malware classification by applying online machine learning, pp. 72–80 (2016)
Dash, S., Suarez-Tangil, G., Khan, S., et al.: DroidScribe: classifying android malware based on runtime behavior (2016)
Jang, J., Yun, J., Mohaisen, A., et al.: Detecting and classifying method based on similarity matching of Android malware behavior with profile. SpringerPlus 5 (2016). https://doi.org/10.1186/s40064-016-1861-x
Malik, S., Khatter, K.: System call analysis of Android malware families. Indian J. Sci. Technol. 9 (2016). https://doi.org/10.17485/ijst/2016/v9i21/90273
Alzaylaee, M.K., Yerima, S.Y., Sezer, S.: EMULATOR vs. REAL PHONE: Android malware detection using machine learning. ArXiv170310926 Cs, pp. 65–72. https://doi.org/10.1145/3041008.3041010
Tong, F., Yan, Z.: A hybrid approach of mobile malware detection in Android. J. Parallel Distrib. Comput. 103, 22–31 (2017). https://doi.org/10.1016/j.jpdc.2016.10.012
Kapratwar, A.: Static and dynamic analysis for Android malware detection. Masters projects (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ilham, S., Ghadi, A. (2018). Detection and Classification of Malwares in Mobile Applications. In: Ben Ahmed, M., Boudhir, A. (eds) Innovations in Smart Cities and Applications. SCAMS 2017. Lecture Notes in Networks and Systems, vol 37. Springer, Cham. https://doi.org/10.1007/978-3-319-74500-8_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-74500-8_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74499-5
Online ISBN: 978-3-319-74500-8
eBook Packages: EngineeringEngineering (R0)