A Review and Case Study on Android Malware: Threat Model, Attacks, Techniques and Tools
-
Published:2021-03-23
Issue:
Volume:
Page:
-
ISSN:2245-4578
-
Container-title:Journal of Cyber Security and Mobility
-
language:
-
Short-container-title:JCSANDM
Author:
Negi Charu,Mishra Preeti,Chaudhary Pooja,Vardhan Harsh
Abstract
As android devices have increased in number in the past few years, the android operating system has started dominating the smartphone market. The vast spread of android across all the devices has made security an important issue as the android users continue to grow exponentially. The security of android platform has become the need of the hour in view of increase in the number of malicious apps and thus several studies have emerged to present the detection approaches. In this paper, we review the android components to propose a threat model that illustrates the possible threats that are present in the android. We also present the attack taxonomy to illustrate the possible attacks at various layers of the android architecture. Experiments demonstrating the feature extraction and classification using machine earning algorithms have also been performed.
Publisher
River Publishers
Subject
Computer Networks and Communications,Hardware and Architecture
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. HOLMES: Artificial Intelligence Enabled Expert System for Efficient Acquisition and Analysis Using Live Memory Forensics;2024 International Conference on Innovations and Challenges in Emerging Technologies (ICICET);2024-06-07
2. Approaches to Selective Imaging of Live Systems via Memory Forensics;2023 3rd International Conference on Intelligent Technologies (CONIT);2023-06-23