Abstract
Importance of personal data has increased along with the evolution of technology. To steal and misuse this data, malicious programs and software are written to exploit the vulnerabilities of the current system. These programs are referred to as malware. Malware harasses the users until their intentions are fulfilled. Earlier malware was major threats to the personal computers. However, now there is a lateral shift in interest toward Android operating system, which has a large market share in smartphones. Day by day, malware is getting stronger and new type of malware is being written so that they are undetected by the present software. Security parameters must be changed to cope up with the changes happening around the world. In this paper, we discuss the different types of malware analysis techniques which are proposed till date to detect the malware in Android platform. Moreover, it also analyzes and concludes about the suitable techniques applicable to the different type of malware.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Digital in 2017: Global overview. March 2018, URL: https://wearesocial.com/special-reports/digital-in-2017-globaloverview.
Android-statistics and facts. March 2018. URL: https://www.statista.com/topics/876/android/.
Mobile malware evolution 2016. Retrieved March 2018 from https://securelist.com/mobile-malware-evolution-2016/77681/.
McAfee labs threat report December 2017. Retrieved March 2018 from https://www.mcafee.com/us/resource/reports/rp-quartely-threats-dec-2017.pdf.
Seth, R., Kaushal, R. (2015). Permission based malware analysis and detection in android.
Liu, X., Liu, J. (2014, April). A two-layered Permission-based android malware detection scheme. In Proceedings of 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, Oxford, UK (pp. 142–148).
Shahriar, H., Islam, M., Clincy, V. (2017). Android malware detection using permission analysis. In Proceedings of Southeast Con, Charlotte, NC, USA.
Faruki, P., Laxmi, V., Bharmal, A., Gaur, M. S., & Ganmoor, V. (2015). AndroSimilar: Robust signature for detecting variants of android malware. Journal of Information Security and Applications, 22, 66–80.
Egele, M., Scholte, T., Kirda, E., & Kruegel, C. (2012). A survey on automated dynamic analysis tools and techniques. ACM Computing Surveys, 44(2), 1–42.
Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011). Crowdroid: Behaviour-based malware detection system for android. In Proceedings of the 1st ACM Work. Security and Privacy in Smartphones and Mobile Devices-SPSM’11 (p. 15).
Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H. (2010).Paranoid android: Versatile protection For smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, ASCAC’10 (pp. 347–356).
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., & Weiss, Y. (2011). Andromaly: A behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 1–30.
Enck, W., Gilbert, P., Chun, B. G., Jung, J., McDaniel, P., & Sheth, A. N. (2010). Taintdroid: An information flow tracking system for real-time privacy monitoring on smartphones. In Osdi’10 (Vol. 49, pp. 1–6).
Amos, B., Turner, H., & White, J. (2013). Applying machine learning classifiers to dynamic android malware detection at scale (pp. 1666–1671).
McLaughlin, N., Del Rincon, J. M., Kang, B., Yerima, S., Miller, P., Sezer, S. … Ahn, G. J. (2017). Deep android malware detection. In Proceedings of CODASPY, Scottsdale, Arizona, USA.
Demontis, A., Melis, M., Biggio, B., Maiorca, D., Arp, D., Rieck, K. … Roli, F. (2017). Yes, Machine learning can be more secure! A case study on android malware D=detection. IEEE Transactions on Dependable and Secure Computing.
Idrees, F., Rajarajan, M., Conti, M., Chen, T. M., & Rahulamathavan, Y. (2017). PIndroid: A novel android malware detection system using ensemble learning methods. Computer and Security, 68, 36–46.
Wei, F., Li, Y., Roy, S., Ou, X., & Zhou, W. (2017). Deep ground truth analysis of current android malware. In International Conference on Detection of Intrusions and Malware, and Vulnerability and Assessment (DIMVA) (pp. 252–276).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khemani, S., Jain, D., Prasad, G. (2019). Android Malware Detection Techniques. In: Shetty, N., Patnaik, L., Nagaraj, H., Hamsavath, P., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Advances in Intelligent Systems and Computing, vol 906. Springer, Singapore. https://doi.org/10.1007/978-981-13-6001-5_36
Download citation
DOI: https://doi.org/10.1007/978-981-13-6001-5_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-6000-8
Online ISBN: 978-981-13-6001-5
eBook Packages: EngineeringEngineering (R0)