Skip to main content
Log in

Comprehensive review and analysis of anti-malware apps for smartphones

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

The new and disruptive technologies for ensuring smartphone security are very limited and largely scattered. The available options and gaps in this research area must be analysed to provide valuable insights about the present technological environment. This work illustrates the research landscape by mapping the existing literature to a comprehensive taxonomy with four categories. The first category includes review and survey articles related to smartphone security. The second category includes papers on smartphone security solutions. The third category includes smartphone malware studies that examine the security aspects of smartphones and the threats posed by malware. The fourth category includes ranking, clustering and classification studies that classify malware based on their families or security risk levels. Several smartphone security apps have also been analysed and compared based on their mechanisms to identify their contents and distinguishing features by using several evaluation metrics and parameters. Two malware detection techniques, namely, machine-learning-based and non-machine-learning-based malware detection, are drawn from the review. The basic characteristics of this emerging field of research are discussed in the following aspects: (1) motivation behind the development of security measures for different smartphone operating system (Oss), (2) open challenges that compromise the usability and personal information of users and (3) recommendations for enhancing smartphone security. This work also reviews the functionalities and services of several anti-malware companies to fully reveal their security mechanisms, features and strategies. This work also highlights the open challenges and issues related to the evaluation and benchmarking of malware detection techniques to identify the best malware detection apps for smartphones.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Wu, S., Wang, P., Li, X., & Zhang, Y. (2016). Effective detection of android malware based on the usage of data flow APIs and machine learning. Information and Software Technology, 75, 17–25.

    Google Scholar 

  2. Sharma, K., & Gupta, B. (2016). Multi-layer defense against malware attacks on smartphone Wi-Fi access channel. Procedia Computer Science, 78, 19–25.

    Google Scholar 

  3. Farina, P., Cambiaso, E., Papaleo, G., & Aiello, M. (2016). Are mobile botnets a possible threat? The case of SlowBot Net. Computers & Security, 58, 268–283.

    Google Scholar 

  4. Do, Q., Martini, B., & Choo, K.-K. R. (2015). Exfiltrating data from Android devices. Computers & Security, 48, 74–91.

    Google Scholar 

  5. Delac, G., Silic, M., & Krolo, J. (2011). Emerging security threats for mobile platforms. In MIPRO, 2011 proceedings of the 34th international convention, 2011 (pp. 1468–1473).

  6. Mikhaylov, D., Zhukov, I., Starikovskiy, A., Kharkov, S., Tolstaya, A., & Zuykov, A. (2013). Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices. In 2013 5th IEEE international conference on broadband network & multimedia technology (IC-BNMT) (pp. 302–305).

  7. Khan, J., Abbas, H., & Al-Muhtadi, J. (2015). Survey on mobile user’s data privacy threats and defense mechanisms. Procedia Computer Science, 56, 376–383.

    Google Scholar 

  8. Eslahi, M., Rostami, M. R., Hashim, H., Tahir, N., & Naseri, M. V. (2014). A data collection approach for Mobile Botnet analysis and detection. In 2014 IEEE symposium on wireless technology and applications (ISWTA) (pp. 199–204).

  9. Amamra, A., Talhi, C., & Robert, J. M. (2012). Smartphone malware detection: From a survey towards taxonomy. In 2012 7th international conference on malicious and unwanted software (MALWARE) (pp. 79–86).

  10. Arshad, S., Shah, M. A., Khan, A., & Ahmed, M. (2016). Android malware detection and protection: A survey. International Journal of Advanced Computer Science and Applications, 7, 463–475.

    Google Scholar 

  11. Tam, K., Feizollah, A., Anuar, N. B., Salleh, R., & Cavallaro, L. (2017). The evolution of android malware and android analysis techniques. ACM Computing Surveys (CSUR), 49(4), 76.

    Google Scholar 

  12. Feizollah, A., Anuar, N. B., Salleh, R., & Wahab, A. W. A. (2015). A review on feature selection in mobile malware detection. Digital Investigation, 13, 22–37.

    Google Scholar 

  13. Peng, S., Yu, S., & Yang, A. (2014). Smartphone malware and its propagation modeling: A survey. IEEE Communications Surveys & Tutorials, 16, 925–941.

    Google Scholar 

  14. Delosières, L., & García, D. (2013). Infrastructure for detecting Android malware. In E. Gelenbe & R. Lent (Eds.), Information sciences and systems 2013 , Lecture Notes in Electrical Engineering, (vol. 264). Cham: Springer.

  15. Karim, A., Shah, S. A. A., Salleh, R. B., Arif, M., Noor, R. M., & Shamshirband, S. (2015). Mobile botnet attacks-an emerging threat: Classification, review and open issues. TIIS, 9, 1471–1492.

    Google Scholar 

  16. Meshram, P. D., & Thool, R. C. (2014). A survey paper on vulnerabilities in android OS and security of android devices. In 2014 IEEE global conference on wireless computing and networking (GCWCN) (pp. 174–178).

  17. Hsieh, W. C., Wu, C. C., & Kao, Y. W. (2015). A study of android malware detection technology evolution. In 2015 international Carnahan conference on security technology (ICCST) (pp. 135–140).

  18. Baykara, M., & Çolak, E. (2018). A review of cloned mobile malware applications for android devices. In 2018 6th international symposium on digital forensic and security (ISDFS) (pp. 1–5).

  19. Turkanović, M., & Polančič, G. (2013). On the security of certain e-communication types: Risks, user awareness and recommendations. Journal of Information Security and Applications, 18, 193–205.

    Google Scholar 

  20. Fang, Z., Han, W., & Li, Y. (2014). Permission based Android security: Issues and countermeasures. Computers & Security, 43, 205–218.

    Google Scholar 

  21. Silva, S. S. C., Silva, R. M. P., Pinto, R. C. G., & Salles, R. M. (2013). Botnets: A survey. Computer Networks, 57, 378–403.

    Google Scholar 

  22. Eshmawi, A., & Nair, S. (2013). Smartphone applications security: Survey of new vectors and solutions. In 2013 ACS international conference on computer systems and applications (AICCSA) (pp. 1–4).

  23. Zachariah, R., Akash, K., Yousef, M. S., & Chacko, A. M. (2017). Android malware detection a survey. In 2017 IEEE international conference on circuits and systems (ICCS) (pp. 238–244).

  24. Kalpana, S., & Karthikeyan, S. (2017). A survey on rise of mobile malware and detection methods. In 2017 international conference on innovations in information, embedded and communication systems (ICIIECS) (pp. 1–5).

  25. Ahvanooey, M. T., Li, Q., Rabbani, M., & Rajput, A. R. (2017). A survey on smartphones security: Software vulnerabilities, malware, and attacks. International Journal of Advanced Computer Science and Applications, 8, 30–45.

    Google Scholar 

  26. Sarmah, U., Bhattacharyya, D. K., & Kalita, J. K. (2018). A survey of detection methods for XSS attacks. Journal of Network and Computer Applications, 118, 113–143.

    Google Scholar 

  27. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38–54.

    Google Scholar 

  28. Ab Razak, M. F., Anuar, N. B., Salleh, R., & Firdaus, A. (2016). The rise of “malware”: Bibliometric analysis of malware study. Journal of Network and Computer Applications, 75, 58–76.

    Google Scholar 

  29. Safavi, S., Shukur, Z., & Razali, R. (2013). Reviews on cybercrime affecting portable devices. Procedia Technology, 11, 650–657.

    Google Scholar 

  30. Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. (2012). A mobile communication honeypot observing system. In 2012 fourth international conference on multimedia information networking and security (pp. 861–865).

  31. Shankar, V. G., & Somani, G. (2016). Anti-Hijack: Runtime detection of malware initiated hijacking in android. Procedia Computer Science, 78, 587–594.

    Google Scholar 

  32. Choi, J., Sung, W., Choi, C., & Kim, P. (2015). Personal information leakage detection method using the inference-based access control model on the Android platform. Pervasive and Mobile Computing, 24, 138–149.

    Google Scholar 

  33. Kumar Thanigaivelan, N., Nigussie, E., Hakkala, A., Virtanen, S., & Isoaho, J. (2018). CoDRA: Context-based dynamically reconfigurable access control system for android. Journal of Network and Computer Applications, 101, 1–17.

    Google Scholar 

  34. Zefferer, T., & Teufl, P. (2013). Policy-based security assessment of mobile end-user devices an alternative to mobile device management solutions for Android smartphones. In 2013 international conference on security and cryptography (SECRYPT) (pp. 1–8).

  35. Armando, A., Merlo, A., & Verderame, L. (2014). Security considerations related to the use of mobile devices in the operation of critical infrastructures. International Journal of Critical Infrastructure Protection, 7, 247–256.

    Google Scholar 

  36. Lee, S. M., Suh, S. B., & Choi, J. D. (2010). Fine-grained I/O access control based on xen virtualization for 3G/4G mobile devices. In Design automation conference (DAC), 2010 47th ACM/IEEE (pp. 108–113).

  37. Mulliner, C., Liebergeld, S., Lange, M., & Seifert, J. P. (2012). Taming Mr Hayes: Mitigating signaling based attacks on smartphones. In IEEE/IFIP international conference on dependable systems and networks (DSN 2012) (pp. 1–12).

  38. Zhang, X., Seifert, J. P., & Aciicmez, O. (2014). Design and implementation of efficient integrity protection for open mobile platforms. IEEE Transactions on Mobile Computing, 13, 188–201.

    Google Scholar 

  39. Zhang, X., Seifert, J.-P., & Acıiçmez, O. (2010). SEIP: Simple and efficient integrity protection for open mobile platforms. In International conference on information and communications security (pp. 107–125).

  40. Chang, D., Hines, S., West, P., Tyson, G., & Whalley, D. (2012). Program differentiation. Journal of Circuits, Systems, and Computers, 21, 1240007.

    Google Scholar 

  41. Kodeswaran, P., Nandakumar, V., Kapoor, S., Kamaraju, P., Joshi, A., & Mukherjea, S. (2012). Securing enterprise data on smartphones using run time information flow control. In 2012 IEEE 13th international conference on mobile data management (pp. 300–305).

  42. Saudi, M. M., & Husainiamer, M. A. B. (2017). Mobile malware classification via system calls and permission for GPS exploitation. International Journal of Advanced Computer Science and Applications, 8, 277–283.

    Google Scholar 

  43. Dai Fei, G., Ai-Fen, S., & Tao, G. (2012). A behavior analysis based mobile malware defense system. In 2012 6th international conference on signal processing and communication systems (ICSPCS) (pp. 1–6).

  44. Adas, H., Shetty, S., & Tayib, W. (2015). Scalable detection of web malware on smartphones. In 2015 international conference on information and communication technology research (ICTRC) (pp. 198–201).

  45. Park, W., Lee, K. H., Kim, S., & Ryu, W. (2015). A financial fraud protection platform on Android smartphones in real-time. In 2015 international conference on information and communication technology convergence (ICTC) (pp. 1246–1248).

  46. Derhab, A., Saleem, K., Al-Muhtadi, J., & Orgun, M. A. (2016). Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices. Computers in Human Behavior, 59, 9–17.

    Google Scholar 

  47. Qingqing, S., Tao, Q., Tan, Y., & Yidong, C. (2013). An Android dynamic data protection model based on light virtualization. In 2013 15th IEEE international conference on communication technology (ICCT) (pp. 65–69).

  48. Kothari, S., Deepak, A., Tamrawi, A., Holland, B., & Krishnan, S. (2014). A “Human-in-the-loop”; approach for resolving complex software anomalies. In 2014 IEEE international conference on systems, man, and cybernetics (SMC) (pp. 1971–1978).

  49. Liang, S., Might, M., & Van Horn, D. (2015). AnaDroid: Malware analysis of android with user-supplied predicates. Electronic Notes in Theoretical Computer Science, 311, 3–14.

    Google Scholar 

  50. Shrestha, B., Ma, D., Zhu, Y., Li, H., & Saxena, N. (2015). Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware. IEEE Transactions on Information Forensics and Security, 10, 2270–2283.

    Google Scholar 

  51. Shrestha, B., Mohamed, M., Borg, A., Saxena, N., & Tamrakar, S. (2015). Curbing mobile malware based on user-transparent hand movements. In 2015 IEEE international conference on pervasive computing and communications (PerCom) (pp. 221–229).

  52. Dongwoo, K., Chankyu, P., & Jaecheol, R. (2015). StopBankun: Countermeasure of app replacement attack on Android. In 2015 seventh international conference on ubiquitous and future networks (pp. 603–605).

  53. Hung, S.-H., Hsiao, S.-W., Teng, Y.-C., & Chien, R. (2015). Real-time and intelligent private data protection for the Android platform. Pervasive and Mobile Computing, 24, 231–242.

    Google Scholar 

  54. Fitzgerald, W. M., Neville, U., & Foley, S. N. (2013). MASON: Mobile autonomic security for network access controls. Journal of Information Security and Applications, 18, 14–29.

    Google Scholar 

  55. Liang, S., Du, X., Tan, C. C., & Yu, W. (2014). An effective online scheme for detecting Android malware. In 2014 23rd international conference on computer communication and networks (ICCCN) (pp. 1–8).

  56. Soh, C., Tan, H. B. K., Arnatovich, Y. L., & Wang, L. (2015). Detecting clones in android applications through analyzing user interfaces. In 2015 IEEE 23rd international conference on program comprehension (pp. 163–173).

  57. Potharaju, R., Newell, A., Nita-Rotaru, C., & Zhang, X. (2012). Plagiarizing smartphone applications: attack strategies and defense techniques. In International symposium on engineering secure software and systems (pp. 106–120).

  58. M. A. Dar (). A novel approach to restrict the access of malicious applications in android. In 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017 (pp. 1–4).

  59. Chen, J., Alalfi, M. H., Dean, T. R., & Zou, Y. (2015). Detecting android malware using clone detection. Journal of Computer Science and Technology, 30, 942–956.

    Google Scholar 

  60. Chen, Y. L., Lee, H. M., Jeng, A. B., & Wei, T. E. (2015). DroidCIA: A novel detection method of code injection attacks on HTML5-based mobile apps. In Trustcom/BigDataSE/ISPA, 2015 IEEE (pp. 1014–1021).

  61. Chen, K., Zhang, Y., & Liu, P. (2018). Leveraging information asymmetry to transform android apps into self-defending code against repackaging attacks. IEEE Transactions on Mobile Computing, 17, 1879–1893.

    Google Scholar 

  62. Niazi, R. H., Shamsi, J. A., Waseem, T., & Khan, M. M. (2015). Signature-based detection of privilege-escalation attacks on Android. In 2015 conference on information assurance and cyber security (CIACS) (pp. 44–49).

  63. Geneiatakis, D., Fovino, I. N., Kounelis, I., & Stirparo, P. (2015). A Permission verification approach for android mobile applications. Computers & Security, 49, 192–205.

    Google Scholar 

  64. Zhongyuan, Q., Xinshuai, Z., Qunfang, Z., & Zhongyun, Y. (2014). An efficient method of detecting repackaged android applications. In International conference on cyberspace technology (CCT 2014) (pp. 1–4).

  65. Louk, M., Lim, H., & Lee, H. (2014). An analysis of security system for intrusion in smartphone environment. The Scientific World Journal. https://doi.org/10.1155/2014/983901.

  66. Suarez-Tangil, G., Tapiador, J. E., & Peris-Lopez, P. (2014). Stegomalware: Playing hide and seek with malicious components in smartphone apps. In International conference on information security and cryptology (pp. 496–515).

  67. Wei, T. E., Mao, C. H., Jeng, A. B., Lee, H. M., Wang, H. T., & Wu, D. J. (2012). Android malware detection via a latent network behavior analysis. In 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (pp. 1251–1258).

  68. Chen, P. S., Lin, S.-C., & Sun, C.-H. (2015). Simple and effective method for detecting abnormal internet behaviors of mobile devices. Information Sciences, 321, 193–204.

    Google Scholar 

  69. Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., & Elovici, Y. (2014). Mobile malware detection through analysis of deviations in application network behavior. Computers & Security, 43, 1–18.

    Google Scholar 

  70. Shabtai, A., Kanonov, U., & Elovici, Y. (2010). Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. Journal of Systems and Software, 83, 1524–1537.

    Google Scholar 

  71. El Attar, A., Khatoun, R., & Lemercier, M. (2014). Clustering-based anomaly detection for smartphone applications. In 2014 IEEE network operations and management symposium (NOMS) (pp. 1–4).

  72. Isohara, T., Takemori, K., & Kubota, A. (2011). Kernel-based behavior analysis for android malware detection. In 2011 seventh international conference on computational intelligence and security (CIS) (pp. 1011–1015).

  73. Xin, K., Li, G., Qin, Z., & Zhang, Q. (2012). Malware detection in smartphone using hidden Markov model. In 2012 fourth international conference on multimedia information networking and security (pp. 857–860).

  74. Ham, Y. J., Choi, W. B., Lee, H. W., Lim, J. & Kim, J. N. (2012). Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities. In 2012 2nd international conference on computer science and network technology (ICCSNT) (pp. 371–375).

  75. Yuan, F., Zhai, L., Cao, Y., & Guo, L. (2013). Research of intrusion detection system on android. In 2013 IEEE ninth world congress on services (pp. 312–316).

  76. Alam, M. S., & Vuong, S. T. (2013). Random forest classification for detecting android malware. In Green computing and communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing (pp. 663–669).

  77. Louw, M. T., Krull, M., Thomas, T., Cathey, R., Frazier, G., & Weber, M. (2013). Automated execution control and dynamic behavior monitoring for android (TM) applications. In MILCOM 2013—2013 IEEE military communications conference (pp. 968–973).

  78. Wei, Y., Hanlin, Z., Linqiang, G., & Hardy, R. (2013). On behavior-based detection of malware on Android platform. In 2013 IEEE global communications conference (GLOBECOM) (pp. 814–819).

  79. Attar, A. E., Khatoun, R., & Lemercier, M. (2014). A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications. In 2014 global information infrastructure and networking symposium (GIIS) (pp. 1–6).

  80. Attar, A. E., Khatoun, R., Birregah, B., & Lemercier, M. (2014). Robust clustering methods for detecting smartphone’s abnormal behavior. In 2014 IEEE wireless communications and networking conference (WCNC) (pp. 2552–2557).

  81. Saad, M. H., Serageldin, A., & Salama, G. I. (2015). Android spyware disease and medication. In 2015 second international conference on information security and cyber forensics (InfoSec) (pp. 118–125).

  82. Wang, C., Li, Z., Mo, X., Yang, H., & Zhao, Y. (2017). An android malware dynamic detection method based on service call co-occurrence matrices. Annals of Telecommunications, 72, 607–615.

    Google Scholar 

  83. Dai, S., Liu, Y., Wang, T., Wei, T., & Zou, W. (2010). Behavior-based malware detection on mobile phone. In 2010 6th international conference on wireless communications networking and mobile computing (WiCOM) (pp. 1–4).

  84. Ham, H.-S., Kim, H.-H., Kim, M.-S., & Choi, M.-J. (2014). Linear SVM-based android malware detection for reliable IoT services. Journal of Applied Mathematics. https://doi.org/10.1155/2014/594501.

  85. Liu, Y., Jia, S., & Xing, C. (2012). A novel behavior-based virus detection method for smart mobile terminals. Discrete Dynamics in Nature and Society. https://doi.org/10.1155/2012/262193.

  86. Suarez-Tangil, G., Conti, M., Tapiador, J. E., & Peris-Lopez, P. (2014). Detecting targeted smartphone malware with behavior-triggering stochastic models. In European symposium on research in computer security (pp. 183–201).

  87. Kurniawan, H., Rosmansyah, Y., & Dabarsyah, B. (2015). Android anomaly detection system using machine learning classification. In 2015 international conference on electrical engineering and informatics (ICEEI) (pp. 288–293).

  88. Lee, S., Lee, J., & Lee, H. (2013). Screening smartphone applications using behavioral signatures. In IFIP international information security conference (pp. 14–27).

  89. Damopoulos, D., Kambourakis, G., Gritzalis, S., & Park, S. O. (2014). Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer-to-Peer Networking and Applications, 7, 687–697.

    Google Scholar 

  90. Lu, Y., Zulie, P., Jingju, L., & Yi, S. (2013). Android malware detection technology based on improved Bayesian classification. In 2013 third international conference on instrumentation, measurement, computer, communication and control (IMCCC) (pp. 1338–1341).

  91. Ming-Yang, S., & Wen-Chuan, C. (2014). Permission-based malware detection mechanisms for smart phones. In The international conference on information networking 2014 (ICOIN2014) (pp. 449–452).

  92. Yerima, S. Y., Sezer, S., McWilliams, G., & Muttik, I. (2013). A new android malware detection approach using bayesian classification. In 2013 IEEE 27th international conference on advanced information networking and applications (AINA) (pp. 121–128).

  93. Faruki, P., Laxmi, V., Ganmoor, V., Gaur, M. S., & Bharmal, A. (2013). DroidOLytics: Robust feature signature for repackaged android apps on official and third party android markets. In 2013 2nd international conference on advanced computing, networking and security (pp. 247–252).

  94. Peiravian, N., & Zhu, X. (2013). Machine learning for android malware detection using permission and API calls. In 2013 IEEE 25th international conference on tools with artificial intelligence (pp. 300–305).

  95. Wen, L. (2013). Mutiple classifier system based android malware detection. In 2013 international conference on machine learning and cybernetics (pp. 57–62).

  96. Yüksel, A. S., Yüksel, M. E., Sertbaş, A., & Zaim, A. H. (2017). Implementation of a web-based service for mobile application risk assessment. Turkish Journal of Electrical Engineering and Computer Science, 25, 976–994.

    Google Scholar 

  97. Fazeen, M., & Dantu, R. (2014). Another free app: Does it have the right intentions?. In 2014 twelfth annual international conference on privacy, security and trust (PST) (pp. 282–289).

  98. Zheng, M., Sun, M., & Lui, J. C. S. (2014). DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability. In 2014 international wireless communications and mobile computing conference (IWCMC) (pp. 128–133).

  99. Teufl, P., Zefferer, T., Woergoetter, C., Oprisnik, A., & Hein, D. (2014). Android: On-device detection of SMS catchers and sniffers. In 2014 international conference on privacy and security in mobile systems (PRISMS) (pp. 1–8).

  100. Shen, T., Zhongyang, Y., Xin, Z., Mao, B., & Huang, H. (2014). Detect android malware variants using component based topology graph. In 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (pp. 406–413).

  101. Dhaya, R., & Poongodi, M. (2014). Detecting software vulnerabilities in android using static analysis. In 2014 international conference on advanced communication control and computing technologies (ICACCCT) (pp. 915–918).

  102. Abraham, A., Andriatsimandefitra, R., Brunelat, A., Lalande, J. F., & Tong, V. V. T. (2015). GroddDroid: A gorilla for triggering malicious behaviors. In 2015 10th international conference on malicious and unwanted software (MALWARE) (pp. 119–127).

  103. Yerima, S. Y., Sezer, S., & Muttik, I. (2015). High accuracy android malware detection using ensemble learning. IET Information Security, 9, 313–320.

    Google Scholar 

  104. Liang, S., & Du, X. (2014). Permission-combination-based scheme for android mobile malware detection. In 2014 IEEE international conference on communications (ICC) (pp. 2301–2306).

  105. Elish, K. O., Shu, X., Yao, D., Ryder, B. G., & Jiang, X. (2015). Profiling user-trigger dependence for Android malware detection. Computers & Security, 49, 255–273.

    Google Scholar 

  106. Feizollah, A., Anuar, N. B., Salleh, R., Suarez-Tangil, G., & Furnell, S. (2017). Androdialysis: Analysis of android intent effectiveness in malware detection. Computers & Security, 65, 121–134.

    Google Scholar 

  107. Talha, K. A., Alper, D. I., & Aydin, C. (2015). APK Auditor: Permission-based Android malware detection system. Digital Investigation, 13, 1–14.

    Google Scholar 

  108. Sheen, S., Anitha, R., & Natarajan, V. (2015). Android based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing, 151(Part 2), 905–912.

    Google Scholar 

  109. Hang, D., He, N., Ge, H., Qi, L., & Zhang, M. (2014). Malware detection method of android application based on simplification instructions. The Journal of China Universities of Posts and Telecommunications, 21, 94–100.

    Google Scholar 

  110. Seo, S.-H., Gupta, A., Mohamed Sallam, A., Bertino, E., & Yim, K. (2014). Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications, 38, 43–53.

    Google Scholar 

  111. Song, J., Han, C., Wang, K., Zhao, J., Ranjan, R., & Wang, L. (2016). An integrated static detection and analysis framework for android. Pervasive and Mobile Computing, 32, 15–25.

    Google Scholar 

  112. Kaur, P., & Sharma, S. (2015). Spyware detection in android using hybridization of description analysis, permission mapping and interface analysis. Procedia Computer Science, 46, 794–803.

    Google Scholar 

  113. Almin, S. B., & Chatterjee, M. (2015). A novel approach to detect android malware. Procedia Computer Science, 45, 407–417.

    Google Scholar 

  114. Faruki, P., Laxmi, V., Bharmal, A., Gaur, M. S., & Ganmoor, V. (2015). AndroSimilar: Robust signature for detecting variants of Android malware. Journal of Information Security and Applications, 22, 66–80.

    Google Scholar 

  115. Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., et al. (2014). Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Notices, 49, 259–269.

    Google Scholar 

  116. Lee, J., Lee, S., & Lee, H. (2015). Screening smartphone applications using malware family signatures. Computers & Security, 52, 234–249.

    Google Scholar 

  117. Wang, X., Yang, Y., & Zeng, Y. (2015). Accurate mobile malware detection and classification in the cloud. SpringerPlus, 4, 1.

    Google Scholar 

  118. Eder, T., Rodler, M., Vymazal, D., & Zeilinger, M. (2013). ANANAS: A framework for analyzing android applications. In 2013 eighth international conference on availability, reliability and security (ARES) (pp. 711–719).

  119. Lindorfer, M., Neugschwandtner, M., & Platzer, C. (2015). MARVIN: Efficient and comprehensive mobile app classification through static and dynamic analysis. In Computer software and applications conference (COMPSAC), 2015 IEEE 39th annual (pp. 422–433).

  120. Wang, P., & Wang, Y.-S. (2015). Malware behavioural detection and vaccine development by using a support vector model classifier. Journal of Computer and System Sciences, 81, 1012–1026.

    Google Scholar 

  121. Stirparo, P., Fovino, I. N., Taddeo, M., & Kounelis, I. (2013). In-memory credentials robbery on android phones. In 2013 World Congress on Internet Security (WorldCIS) (pp. 88–93).

  122. Nguyen, L., Tian, Y., Cho, S., Kwak, W., Parab, S., Kim, Y., et al. (2013). UnLocIn: Unauthorized location inference on smartphones without being caught. In 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS) (pp. 1–8).

  123. Kotkar, C., & Game, P. (2015). Prevention mechanism for prohibiting SMS malware attack on android smartphone. In 2015 annual IEEE India conference (INDICON) (pp. 1–5).

  124. Te-En, W., Jeng, A. B., Hahn-Ming, L., Chih-How, C., & Chin-Wei, T. (2012). Android privacy. In 2012 international conference on machine learning and cybernetics (pp. 1830–1837).

  125. Shastry, A., Kantarcioglu, M., Zhou, Y., & Thuraisingham, B. (2012). Randomizing smartphone malware profiles against statistical mining techniques. In IFIP annual conference on data and applications security and privacy (pp. 239–254).

  126. Liu, Z. Y., Li, Y. C., Yang, H. C., & Qiu, J. (2014). A case study on key technologies of Android Trojans. In 2014 11th international computer conference on wavelet active media technology and information processing (ICCWAMTIP) (pp. 321–324).

  127. Szongott, C., Henne, B., & Smith, M. (2012). Evaluating the threat of epidemic mobile malware. In 2012 IEEE 8th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 443–450).

  128. Maier, D., Protsenko, M., & Müller, T. (2015). A game of Droid and Mouse: The threat of split-personality malware on Android. Computers & Security, 54, 2–15.

    Google Scholar 

  129. Fernandes, E., Crispo, B., & Conti, M. (2013). Fm 99.9, radio virus: Exploiting fm radio broadcasts for malware deployment. IEEE Transactions on Information Forensics and Security, 8, 1027–1037.

    Google Scholar 

  130. Chiang, H. S., & Tsaur, W. J. (2010). Mobile malware behavioral analysis and preventive strategy using ontology. In 2010 IEEE second international conference on social computing (SocialCom) (pp. 1080–1085).

  131. Sobhani, A., & Keshavarz-Haddad, A. (2015). A distributed patching scheme for controlling mobile malware infection. In 2015 23rd Iranian conference on electrical engineering (pp. 187–192).

  132. Park, J.-K., & Choi, S.-Y. (2015). Studying security weaknesses of android system. International Journal of Security and Its Applications. Science and Engineering Research Support Center, 9, 7–12.

    Google Scholar 

  133. Titze, D., Stephanow, P., & Schütte, J. (2013). A configurable and extensible security service architecture for smartphones. In 2013 27th international conference on advanced information networking and applications workshops (WAINA) (pp. 1056–1062).

  134. Kim, S., & Lee, K. T. (2014). A security architecture for BYOD office. In 2014 international conference on advanced technologies for communications (ATC 2014) (pp. 487–490).

  135. Chung, S., Chung, S., Escrig, T., Bai, Y., & Endicott-Popovsky, B. (2012). 2TAC: Distributed access control architecture for “bring your own device” security. In 2012 ASE/IEEE international conference on biomedical computing (BioMedCom) (pp. 123–126).

  136. Cho, T., & Seo, S.-H. (2015). A strengthened android signature management method. TIIS, 9, 1210–1230.

    Google Scholar 

  137. Gilad, Y., Herzberg, A., & Trachtenberg, A. (2014). Securing smartphones: A µTCB approach. IEEE Pervasive Computing, 13, 72–79.

    Google Scholar 

  138. Paul, M., Chauhan, N. S., & Saxena, A. (2011). A security analysis of smartphone data flow and feasible solutions for lawful interception. In 2011 7th international conference on information assurance and security (IAS) (pp. 19–24).

  139. Lee, C., Kim, J., Cho, S.-J., Choi, J., & Park, Y. (2014). Unified security enhancement framework for the Android operating system. The Journal of Supercomputing, 67, 738–756.

    Google Scholar 

  140. Bani-Hani, R. M., Wahsheh, Y. A., & Al-Sarhan, M. B. (2014). Secure QR code system. In 2014 10th international conference on innovations in information technology (INNOVATIONS) (pp. 1–6).

  141. Feng, T., DeSalvo, N., Xu, L., Zhao, X., Wang, X., & Shi, W. (2014). Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior. In 2014 6th international conference on mobile computing, applications and services (MobiCASE) (pp. 206–215).

  142. Teufl, P., Zefferer, T., & Stromberger, C. (2013). Mobile device encryption systems. In IFIP international information security conference (pp. 203–216).

  143. Baek, J., & Youm, H. Y. (2015). Secure and lightweight authentication protocol for NFC tag based services. In 2015 10th Asia joint conference on information security (AsiaJCIS) (pp. 63–68).

  144. Pournaghshband, V., Meyer, D., Holyland, M., Sarrafzadeh, M., & Reiher, P. (2014). Adrasteia: A smartphone app for securing legacy mobile medical devices. In 2014 IEEE 17th international conference on computational science and engineering (CSE) (pp. 758–763).

  145. Guri, M., Kedma, G., Zadov, B., & Elovici, Y. (2014). Trusted detection of sensitive activities on mobile phones using power consumption measurements. In Intelligence and security informatics conference (JISIC), 2014 IEEE Joint (pp. 145–151).

  146. Guido, M., Ondricek, J., Grover, J., Wilburn, D., Nguyen, T., & Hunt, A. (2013). Automated identification of installed malicious Android applications. Digital Investigation, 10(Supplement), S96–S104.

    Google Scholar 

  147. Alam, M., & Vuong, S. T. (2014). An intelligent multi-agent based detection framework for classification of android malware. In International conference on active media technology (pp. 226–237).

  148. Singh, S., Mishra, B., & Singh, S. (2015). Detecting intelligent malware on dynamic Android analysis environments. In 2015 10th international conference for internet technology and secured transactions (ICITST) (pp. 414–419).

  149. Qian, H., & Wen, Q. (2012). A cloud-based system for enhancing security of Android devices. In 2012 IEEE 2nd international conference on cloud computing and intelligence systems (pp. 245–249).

  150. Zonouz, S., Houmansadr, A., Berthier, R., Borisov, N., & Sanders, W. (2013). Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Computers & Security, 37, 215–227.

    Google Scholar 

  151. Ding, J.-H., Chien, R., Hung, S.-H., Lin, Y.-L., Kuo, C.-Y., Hsu, C.-H., et al. (2014). A framework of cloud-based virtual phones for secure intelligent information management. International Journal of Information Management, 34, 329–335.

    Google Scholar 

  152. Dye, S. M., & Scarfone, K. (2014). A standard for developing secure mobile applications. Computer Standards & Interfaces, 36, 524–530.

    Google Scholar 

  153. Zhu, K., Song, Y., & Chen, F. (2014). Implementation of automated testing system for android applications based on dynamic taint propagation. In Communications security conference (CSC 2014) (pp. 1–5).

  154. Lagerspetz, E., Truong, H. T. T., Tarkoma, S., & Asokan, N. (2014). MDoctor: A mobile malware prognosis application. In 2014 IEEE 34th international conference on distributed computing systems workshops (ICDCSW) (pp. 201–206).

  155. Wählisch, M., Trapp, S., Schiller, J., Jochheim, B., Nolte, T., Schmidt, T. C., et al. (2012). Vitamin C for your smartphone: The SKIMS approach for cooperativeand lightweight security at mobiles. ACM SIGCOMM Computer Communication Review, 42, 271–272.

    Google Scholar 

  156. Pieterse, H., & Olivier, M. S. (2013). Security steps for smartphone users. In 2013 Information Security for South Africa (pp. 1–6).

  157. Hoque, E., Potharaju, R., Nita-Rotaru, C., Sarkar, S., & Venkatesh, S. S. (2015). Taming epidemic outbreaks in mobile adhoc networks. Ad Hoc Networks, 24, 57–72.

    Google Scholar 

  158. Bhatt, A. J., & Gupta, C. (2017). Comparison of static and dynamic analyzer tools for iOS applications. Wireless Personal Communications, 96, 4013–4046.

    Google Scholar 

  159. Bernik, I., & Markelj, B. (2012). Blended threats to mobile devices on the rise. In 2012 international conference on information society (i-Society) (pp. 59–64).

  160. Pieterse, H., & Olivier, M. S. (2012). Android botnets on the rise: Trends and characteristics. In 2012 information security for South Africa (pp. 1–5).

  161. Xueming, L. (2013). Access control research based on trusted computing android smartphone. In 2013 third international conference on intelligent system design and engineering applications (ISDEA) (pp. 213–215).

  162. Pu, S., Chen, Z., Huang, C., Liu, Y., & Zen, B. (2014). Threat analysis of smart mobile device. In General assembly and scientific symposium (URSI GASS), 2014 XXXIth URSI (pp. 1–3).

  163. Rastogi, S., Bhushan, K., & Gupta, B. (2016). Android applications repackaging detection techniques for smartphone devices. Procedia Computer Science, 78, 26–32.

    Google Scholar 

  164. Batten, L., Moonsamy, V., & Alazab, M. (2015). Smartphone applications, malware and data theft. In M. Senthilkumar, V. Ramasamy, S. Sheen, C. Veeramani, A. Bonato, & L. Batten (Eds.), Computational intelligence, cyber security and computational models (pp. 15–24). Berlin: Springer. https://doi.org/10.1007/978-981-10-0251-9_2.

  165. Mu, J., Cui, A., & Rao, J. (2013). Android mobile security–threats and protection. In International conference on computer, networks and communication engineering (ICCNCE 2013) (pp. 683–686).

  166. Abdullah, Z., Saudi, M. M., & Anuar, N. B. (2014). Mobile botnet detection: Proof of concept. In 2014 IEEE 5th Control and System Graduate Research Colloquium (ICSGRC) (pp. 257–262).

  167. Kumar, M., & Hanumanthappa, M. (2015). Cloud based intrusion detection architecture for smartphones. In 2015 international conference on innovations in information, embedded and communication systems (ICIIECS) (pp. 1–6).

  168. Yang, T., Yang, Y., Qian, K., Lo, D. C. T., Qian, Y., & Tao, L. (2015). Automated detection and analysis for android ransomware. In 2015 IEEE 17th international conference on high performance computing and communications (HPCC), 2015 IEEE 7th international symposium on cyberspace safety and security (CSS), 2015 IEEE 12th international conferen on embedded software and systems (ICESS) (pp. 1338–1343).

  169. Ghallali, M., & Ouahidi, B. E. (2012). Security of mobile phones: Prevention methods for the spread of malware. In 2012 6th international conference on sciences of electronics, technologies of information and telecommunications (SETIT) (pp. 648–651).

  170. Lee, S., & Ju, D. Y. (2013). Assessment of malicious applications using permissions and enhanced user interfaces on Android. In 2013 IEEE international conference on intelligence and security informatics (ISI) (pp. 270–270).

  171. Dixon, B., & Mishra, S. (2010). On rootkit and malware detection in smartphones. In 2010 international conference on dependable systems and networks workshops (DSN-W) (pp. 162–163).

  172. Chiang, H. S., & Tsaur, W. J. (2011). Identifying smartphone malware using data mining technology. In 2011 proceedings of 20th international conference on computer communications and networks (ICCCN) (pp. 1–6).

  173. Bing, H. (2012). Analysis and research of system security based on android. In 2012 fifth international conference on intelligent computation technology and automation (ICICTA) (pp. 581–584).

  174. Lei, Z., Junmao, Z., Zhongguang, T., Yulong, L., & Tao, W. (2011). Design of mobile phone security system based on detection of abnormal behavior. In 2011 first international conference on instrumentation, measurement, computer, communication and control (pp. 479–482).

  175. Woo-Sung, C., & Dea-Woo, P. (2012). Malicious code hiding android APP’s distribution and hacking attacks and incident analysis. In 2012 8th international conference on information science and digital content technology (ICIDT) (pp. 686–689).

  176. Seo, S. H., Lee, D. G., & Yim, K. (2012). Analysis on maliciousness for mobile applications. In 2012 sixth international conference on innovative mobile and internet services in ubiquitous computing (IMIS) (pp. 126–129).

  177. Chemerkin, Y. (2012). Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook). In 2012 international conference for Internet technology and secured transactions (pp. 483–487).

  178. Park, M. W., & Chung, T. M. (2013). Vulnerability of the smartphone applications to connect with compromised access point. In 2013 international conference on information science and applications (ICISA) (pp. 1–2).

  179. Attar, A. E., Khatoun, R., & Lemercier, M. (2013). Diagnosing smartphone’s abnormal behavior through robust outlier detection methods. In Global information infrastructure symposium—GIIS 2013 (pp. 1–3).

  180. Zaman, M., Siddiqui, T., Amin, M. R., & Hossain, M. S. (2015). Malware detection in Android by network traffic analysis. In 2015 international conference on networking systems and security (NSysS) (pp. 1–5).

  181. Park, W., Kim, S., & Ryu, W. (2015). Detecting malware with similarity to Android applications. In 2015 international conference on information and communication technology convergence (ICTC) (pp. 1249–1251).

  182. Kim, M., Lee, T. J., Shin, Y., & Youm, H. Y. (2016). A study on behavior-based mobile malware analysis system against evasion techniques. In 2016 international conference on information networking (ICOIN), 2016 (pp. 455–457).

  183. Singh, P., Tiwari, P., & Singh, S. (2016). Analysis of malicious behavior of android apps. Procedia Computer Science, 79, 215–220.

    Google Scholar 

  184. Chen, P.-Y., Lin, H.-F., Hsu, K.-H., & Cheng, S.-M. (2014). Modeling dynamics of malware with incubation period from the view of individual. In 2014 IEEE 79th vehicular technology conference (VTC Spring) (pp. 1–5).

  185. Teufl, P., Ferk, M., Fitzek, A., Hein, D., Kraxberger, S., & Orthacker, C. (2013). Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play). Security and Communication Networks, 9(5), 389–419.

    Google Scholar 

  186. Peng, S., Wu, M., Wang, G., & Yu, S. (2014). Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Computers & Security, 44, 92–103.

    Google Scholar 

  187. Martinelli, F., Saracino, A., Sgandurra, D., & Aldini, A. (2013). A collaborative framework for generating probabilistic contracts. In 2013 international conference on collaboration technologies and systems (CTS) (pp. 139–142).

  188. Peng, S., Wang, G., & Yu, S. (2013). Modeling malware propagation in smartphone social networks. In 2013 12th IEEE international conference on trust, security and privacy in computing and communications (pp. 196–201).

  189. Park, Y., Reeves, D. S., & Stamp, M. (2013). Deriving common malware behavior through graph clustering. Computers & Security, 39, 419–430.

    Google Scholar 

  190. Peng, S., Wu, M., Wang, G., & Yu, S. (2014). Containing smartphone worm propagation with an influence maximization algorithm. Computer Networks, 74, 103–113.

    Google Scholar 

  191. Li, F., Yang, Y., & Wu, J. (2010). CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks. Presented at the Proceedings of the 29th conference on information communications, San Diego, California, USA.

  192. Xie, L., Zhang, X., Seifert, J.-P., & Zhu, S. (2010). pBMDS: A behavior-based malware detection system for cellphone devices. In Proceedings of the third ACM conference on wireless network security (pp. 37–48).

  193. Omar, M., & Dawson, M. (2013). Research in progress—Defending android smartphones from malware attacks. In 2013 third international conference on advanced computing and communication technologies (ACCT) (pp. 288–292).

  194. Al-Hadadi, M., & Shidhani, A. A. (2013). Smartphone security awareness: Time to act. In 2013 international conference on current trends in information technology (CTIT) (pp. 166–171).

  195. Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. Computers & Security, 48, 281–297.

    Google Scholar 

  196. Markelj, B., & Bernik, I. (2015). Safe use of mobile devices arises from knowing the threats. Journal of Information Security and Applications, 20, 84–89.

    Google Scholar 

  197. Imgraben, J., Engelbrecht, A., & Choo, K.-K. R. (2014). Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behaviour & Information Technology, 33, 1347–1360.

    Google Scholar 

  198. Panja, B., Fattaleh, D., Mercado, M., Robinson, A., & Meharia, P. (2013). Cybersecurity in banking and financial sector: Security analysis of a mobile banking application. In 2013 international conference on collaboration technologies and systems (CTS) (pp. 397–403).

  199. Adebayo, O. S. & Aziz, N. A. (2014). Techniques for analysing Android malware. In 2014 the 5th international conference on information and communication technology for the Muslim World (ICT4M) (pp. 1–6).

  200. Salerno, S., Sanzgiri, A., & Upadhyaya, S. (2011). Exploration of attacks on current generation smartphones. Procedia Computer Science, 5, 546–553.

    Google Scholar 

  201. Zdziarski, J. (2014). Identifying back doors, attack points, and surveillance mechanisms in iOS devices. Digital Investigation, 11, 3–19.

    Google Scholar 

  202. Maiorca, D., Ariu, D., Corona, I., Aresu, M., & Giacinto, G. (2015). Stealth attacks: An extended insight into the obfuscation effects on Android malware. Computers & Security, 51, 16–31.

    Google Scholar 

  203. Yu, W., Zhang, H., & Xu, G. (2013). A study of malware detection on smart mobile devices. In SPIE defense, security, and sensing, 2013 (pp. 87570H–87570H-8).

  204. Mylonas, A., Dritsas, S., Tsoumas, B., & Gritzalis, D. (2011). Smartphone security evaluation: The malware attack case. In 2011 proceedings of the international conference on security and cryptography (SECRYPT) (pp. 25–36).

  205. Virvilis, N., Mylonas, A., Tsalis, N., & Gritzalis, D. (2015). Security busters: Web Browser security vs. rogue sites. Computers & Security, 52, 90–105.

    Google Scholar 

  206. Li, F., Huang, C.-T., Huang, J., & Peng, W. (2014). Feedback-based smartphone strategic sampling for BYOD security. In 2014 23rd international conference on computer communication and networks (ICCCN) (pp. 1–8).

  207. Armando, A., Merlo, A., Migliardi, M., & Verderame, L. (2013). Breaking and fixing the android launching flow. Computers & Security, 39(Part A), 104–115.

    Google Scholar 

  208. Cheon, W. B., Heo, K., Lim, W. G., Park, W. H., & Chung, T. M. (2011). The new vulnerability of service set identifier (SSID) using QR code in android phone. In 2011 international conference on information science and applications (pp. 1–6).

  209. Hua, J., & Sakurai, K. (2013). Botnet command and control based on Short Message Service and human mobility. Computer Networks, 57, 579–597.

    Google Scholar 

  210. Pan, J., & Chun Che, F. (2013). An offensive containment strategy based on Malware’s attack patterns. In 2013 international conference on machine learning and cybernetics (pp. 1631–1636).

  211. Dixon, B., & Mishra, S. (2013). Power based malicious code detection techniques for smartphones. In 2013 12th IEEE international conference on trust, security and privacy in computing and communications (pp. 142–149).

  212. Alfalqi, K., Alghamdi, R., & Waqdan, M. (2015). Android platform malware analysis. International Journal of Advanced Computer Science and Applications (IJACSA). https://doi.org/10.14569/IJACSA.2015.060120

  213. Amamra, A., Robert, J. M., & Talhi, C. (2015). Enhancing malware detection for Android systems using a system call filtering and abstraction process. Security and Communication Networks, 8, 1179–1192.

    Google Scholar 

  214. Amos, B., Turner, H., & White, J. (2013). Applying machine learning classifiers to dynamic Android malware detection at scale. In 2013 9th international wireless communications and mobile computing conference (IWCMC) (pp. 1666–1671).

  215. Amamra, A., Talhi, C., & Robert, J. M. (2012). Performance evaluation of multi-pattern matching algorithms on smartphone. In 2012 seventh international conference on broadband, wireless computing, communication and applications (BWCCA) (pp. 329–334).

  216. Merlo, A., Costa, G., Verderame, L., & Armando, A. (2016). Android vs. SEAndroid: An empirical assessment. Pervasive and Mobile Computing, 30, 113–131.

    Google Scholar 

  217. Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Pastrana, S. (2015). Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation. Pervasive and Mobile Computing, 18, 137–151.

    Google Scholar 

  218. Krombholz, K., Frühwirt, T., Rieder, Kapsalis, I., et al. (2015). QR code security—How secure and usable apps can protect users against malicious QR codes. In 2015 10th international conference on availability, reliability and security (ARES) (pp. 230–237).

  219. Gelenbe, E., Görbil, G., Tzovaras, D. K., Liebergeld, S., García, D., Baltatu, M., et al. (2013). NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In Information sciences and systems (pp. 369–378). Berlin: Springer.

  220. Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., van den Veen, V., & Platzer, C. (2014). ANDRUBIS—1,000,000 apps later: A view on current android malware behaviors. In 2014 third international workshop on building analysis datasets and gathering experience returns for security (BADGERS) (pp. 3–17).

  221. Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In 2012 IEEE symposium on security and privacy (pp. 95–109).

  222. Pieterse, H., & Burke, I. (2015). Evolution study of android botnets. In Iccws 2015—The proceedings of the 10th international conference on cyber warfare and security: ICCWS2015 (p. 232).

  223. Su, X., Chuah, M., & Tan, G. (2012). Smartphone dual defense protection framework: Detecting malicious applications in android markets. In 2012 eighth international conference on mobile ad-hoc and sensor networks (MSN) (pp. 153–160).

  224. Attar, A. E., Khatoun, R., & Lemercier, M. (2014). Trimming approach of robust clustering for smartphone behavioral analysis. In 2014 12th IEEE international conference on embedded and ubiquitous computing (EUC) (pp. 315–320).

  225. Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Blasco, J. (2014). Dendroid: A text mining approach to analyzing and classifying code structures in android malware families. Expert Systems with Applications, 41, 1104–1117.

    Google Scholar 

  226. Jang, J.-W., Kang, H., Woo, J., Mohaisen, A., & Kim, H. K. (2015). Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Digital Investigation, 14, 17–35.

    Google Scholar 

  227. Mylonas, A., Dritsas, S., Tsoumas, B., & Gritzalis, D. (2011). On the feasibility of malware attacks in smartphone platforms. In International conference on e-business and telecommunications (pp. 217–232).

  228. Tang, W., Jin, G., He, J., & Jiang, X. (2011). Extending android security enforcement with a security distance model. In 2011 international conference on internet technology and applications (iTAP) (pp. 1–4).

  229. Kuehnhausen, M., & Frost, V. S. (2013). Trusting smartphone Apps? To install or not to install, that is the question. In 2013 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA) (pp. 30–37).

  230. Wu, B., Lu, T., Zheng, K., Zhang, D., & Lin, X. (2014). Smartphone malware detection model based on artificial immune system. China Communications, 11, 86–92.

    Google Scholar 

  231. Rashidi, B., Fung, C., & Vu, T. (2015). Dude, ask the experts!: Android resource access permission recommendation with RecDroid. In 2015 IFIP/IEEE international symposium on integrated network management (IM) (pp. 296–304).

  232. Shastry, A., Kantarcioglu, M., Zhou, Y., & Thuraisingham, B. (2012). Randomizing smartphone malware profiles against statistical mining techniques (pp. 239–254). Berlin: Springer.

    Google Scholar 

  233. Alam, M. S. & Vuong, S. T. (2013). Random forest classification for detecting android malware. In 2013 IEEE international conference on green computing and communications and IEEE Internet of Things and IEEE cyber, physical and social computing (pp. 663–669).

  234. Meskini, S., Nassif, A. B., & Capretz, L. F. (2013). Reliability models applied to mobile applications. In 2013 IEEE seventh international conference on software security and reliability companion (pp. 155–162).

  235. Yas, Q. M., et al. (2018). Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions. Measurement, 114, 243–260. https://doi.org/10.1016/j.measurement.2017.09.027.

    Google Scholar 

  236. Zaidan, A. A., et al. (2018). A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution. Health and Technology, 8(4), 223–238. https://doi.org/10.1007/s12553-018-0223-9.

    Google Scholar 

  237. Beikkhakhian, Y., Javanmardi, M., Karbasian, M., & Khayambashi, B. (2015). The application of ISM model in evaluating agile suppliers selection criteria and ranking suppliers using fuzzy TOPSIS-AHP methods. Expert Systems with Applications, 42(15), 6224–6236.

    Google Scholar 

  238. Ortiz Barrios, M. A., Nino, C., Patricia, J., La De Hoz, A. A., De Felice, F., & Petrillo, A. (2016). An integrated approach of AHP-DEMATEL methods applied for the selection of allied hospitals in outpatient service. International Journal of Medical Engineering and Informatics, 8(2), 87–107.

    Google Scholar 

  239. Yoon, K. P., & Hwang, C.-L. (1995). Multiple attribute decision making: an introduction (Vol. 104). London: Sage publications.

    Google Scholar 

  240. Nilsson, H., Nordström, E.-M., & Öhman, K. (2016). Decision support for participatory forest planning using AHP and TOPSIS. Forests, 7(5), 100.

    Google Scholar 

  241. Jumaah, F. M., et al. (2018). Decision-making solution based multi-measurement design parameter for optimization of GPS receiver tracking channels in static and dynamic real-time positioning multipath environment. Measurement, 118, 83–95. https://doi.org/10.1016/j.measurement.2018.01.011.

    Google Scholar 

  242. Zaidan, A. A., et al. (2015). Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS. Journal of Biomedical Informatics, 53, 390–404.

    Google Scholar 

  243. Zaidan, A. A., et al. (2015). Multi-criteria analysis for OS-EMR software selection problem: A comparative study. Decision Support Systems, 78, 15–27.

    Google Scholar 

  244. Abdullateef, B. N., et al. (2016). An evaluation and selection problems of OSS-LMS packages. SpringerPlus, 5(1), 1–35.

    Google Scholar 

  245. Yas, Q. M., et al. (2017). Towards on develop a framework for the evaluation and benchmarking of skin detectors based on artificial intelligent models using multi-criteria decision-making techniques. International Journal of Pattern Recognition and Artificial Intelligence, 31(03), 1759002.

    Google Scholar 

  246. Zaidan, B. B., et al. (2017). A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi-criteria analysis based on ‘large-scale data’. Software: Practice and Experience, 47(10), 1365–1392.

    Google Scholar 

  247. Zaidan, B. B., & Zaidan, A. A. (2017). Software and hardware FPGA-based digital watermarking and steganography approaches: Toward new methodology for evaluation and benchmarking using multi-criteria decision-making techniques. The Journal of Circuits, Systems and Computers, 26(07), 1750116.

    Google Scholar 

  248. Zaidan, B. B., Zaidan, A. A., Abdul Karim, H., & Ahmad, N. N. (2017). A new approach based on multi-dimensional evaluation and benchmarking for data hiding techniques. International Journal of Information Technology & Decision Making, 17, 1–42.

  249. Qader, M. A., et al. (2017). A methodology for football players selection problem based on multi-measurements criteria analysis. Measurement: Journal of the International Measurement Confederation, 111, 38–50.

    Google Scholar 

  250. Jumaah, F. M., et al. (2018). Technique for order performance by similarity to ideal solution for solving complex situations in multi-criteria optimization of the tracking channels of GPS baseband telecommunication receivers. Telecommunication Systems, 68(3), 425–443.

    Google Scholar 

  251. Rahmatullah, B., et al. (2017). Multi-complex attributes analysis for optimum GPS baseband receiver tracking channels selection. In 2017 4th international conference on control, decision and information technologies, CoDIT 2017 (Vol. 2017–Janua, pp. 1084–1088).

  252. Salman, O. H., et al. (2017). Novel methodology for triage and prioritizing using “big data” patients with chronic heart diseases through telemedicine environmental. International Journal of Information Technology & Decision Making, 16(05), 1211–1245.

    Google Scholar 

  253. Zaidan, B. B., & Zaidan, A. A. (2018). Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques. Measurement : Journal of the International Measurement Confederation, 117, 277–294.

    Google Scholar 

  254. Kalid, N., et al. (2018). Based on real time remote health monitoring systems: A new approach for prioritization ‘large scales data’ patients with chronic heart diseases using body sensors and communication technology. Journal of Medical Systems, 42(4), 69.

    Google Scholar 

  255. Alsalem, M. A., et al. (2018). Systematic review of an automated multiclass detection and classification system for acute Leukaemia in terms of evaluation and benchmarking, open challenges, issues and methodological aspects. Journal of Medical Systems, 42(11), 204.

    Google Scholar 

  256. Enaizan, O., et al. (2018). Electronic medical record systems: Decision support examination framework for individual, security and privacy concerns using multi-perspective analysis. Health and Technology, 8, 1–28.

  257. Salih, M. M., et al. (2019). Survey on fuzzy TOPSIS state-of-the-art between 2007–2017. Computers & Operations Research, 104, 207–227.

  258. Kalid, N., et al. (2018). Based real time remote health monitoring systems: A review on patients prioritization and related ‘big data’ using body sensors information and communication technology. Journal of Medical Systems, 42(2), 30.

    Google Scholar 

  259. Albahri, A. S., et al. (2018). Real-time fault-tolerant mHealth System: Comprehensive review of healthcare services, opens issues, challenges and methodological aspects. Journal of Medical Systems, 42(8), 137.

    Google Scholar 

  260. Albahri, O. S., et al. (2018). Real-time remote health-monitoring systems in a medical centre: A review of the provision of healthcare services-based body sensor information, open challenges and methodological aspects. Journal of Medical Systems, 42(9), 164.

    Google Scholar 

  261. Albahri, A. S., et al. (2019). Based multiple heterogeneous wearable sensors: A smart real-time health monitoring structured for hospitals distributor. IEEE Access, 7, 37269–37323. https://doi.org/10.1109/ACCESS.2019.2898214.

    Google Scholar 

  262. Shankar, V. G., Somani, G., Gaur, M. S., Laxmi, V., & Conti, M. (2017). AndroTaint: An efficient android malware detection framework using dynamic taint analysis. In 2017 ISEA Asia security and privacy (ISEASP) (pp. 1–13).

  263. Fan, M., Liu, J., Wang, W., Li, H., Tian, Z., & Liu, T. (2017). DAPASA: Detecting android piggybacked apps through sensitive subgraph analysis. IEEE Transactions on Information Forensics and Security, 12, 1772–1785.

    Google Scholar 

  264. Ajaeiya, G., Elhajj, I. H., Chehab, A., Kayssi, A., & Kneppers, M. (2018). Mobile Apps identification based on network flows. Knowledge and Information Systems, 55, 771–796.

  265. Papadopoulos, H., Georgiou, N., Eliades, C., & Konstantinidis, A. (2018). Android malware detection with unbiased confidence guarantees. Neurocomputing, 280, 3–12.

    Google Scholar 

  266. Ham, Y. J., Choi, W. B., Lee, H. W., Lim, J., & Kim, J. N. (2012). Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities. In Proceedings of 2012 2nd international conference on computer science and network technology (pp. 371–375).

  267. Tan, Y.-A., Xue, Y., Liang, C., Zheng, J., Zhang, Q., Zheng, J., et al. (2018). A root privilege management scheme with revocable authorization for Android devices. Journal of Network and Computer Applications, 107, 69–82.

    Google Scholar 

  268. Wang, H., He, H., & Zhang, W. (2018). Demadroid: Object reference graph-based malware detection in android. Security and Communication Networks. https://doi.org/10.1155/2018/7064131.

  269. Wang, X., Yang, Y., & Zeng, Y. (2015). Accurate mobile malware detection and classification in the cloud. SpringerPlus, 4, 583.

    Google Scholar 

  270. Lu, Y., Zulie, P., Jingju, L., & Yi, S. (2013). Android malware detection technology based on improved Bayesian classification. In 2013 third international conference on instrumentation, measurement, computer, communication and control (pp. 1338–1341).

  271. Fazeen, M., & Dantu, R. (2014). Another free app: Does it have the right intentions? In 2014 twelfth annual international conference on privacy, security and trust (pp. 282–289).

  272. Lindorfer, M., Neugschwandtner, M., & Platzer, C. (2015). MARVIN: Efficient and comprehensive mobile app classification through static and dynamic analysis. In 2015 IEEE 39th annual computer software and applications conference (pp. 422–433).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. A. Zaidan.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Talal, M., Zaidan, A.A., Zaidan, B.B. et al. Comprehensive review and analysis of anti-malware apps for smartphones. Telecommun Syst 72, 285–337 (2019). https://doi.org/10.1007/s11235-019-00575-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-019-00575-7

Keywords

Navigation