Reference Hub5
Survey in Smartphone Malware Analysis Techniques

Survey in Smartphone Malware Analysis Techniques

Moutaz Alazab, Lynn M. Batten
ISBN13: 9781466683457|ISBN10: 1466683457|EISBN13: 9781466683464
DOI: 10.4018/978-1-4666-8345-7.ch007
Cite Chapter Cite Chapter

MLA

Alazab, Moutaz, and Lynn M. Batten. "Survey in Smartphone Malware Analysis Techniques." New Threats and Countermeasures in Digital Crime and Cyber Terrorism, edited by Maurice Dawson and Marwan Omar, IGI Global, 2015, pp. 105-130. https://doi.org/10.4018/978-1-4666-8345-7.ch007

APA

Alazab, M. & Batten, L. M. (2015). Survey in Smartphone Malware Analysis Techniques. In M. Dawson & M. Omar (Eds.), New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 105-130). IGI Global. https://doi.org/10.4018/978-1-4666-8345-7.ch007

Chicago

Alazab, Moutaz, and Lynn M. Batten. "Survey in Smartphone Malware Analysis Techniques." In New Threats and Countermeasures in Digital Crime and Cyber Terrorism, edited by Maurice Dawson and Marwan Omar, 105-130. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-8345-7.ch007

Export Reference

Mendeley
Favorite

Abstract

Smartphone Malware continues to be a serious threat in today's world. Recent research studies investigate the impacts of new malware variant. Historically traditional anti-malware analyses rely on the signatures of predefined malware samples. However, this technique is not resistant against the obfuscation techniques (e.g. polymorphic and metamorphic). While the permission system proposed by Google, requires smartphone users to pay attention to the permission description during the installation time. Nevertheless, normal users cannot comprehend the semantics of Android permissions. This chapter surveys various approaches used in Smartphone malware detection and Investigates weaknesses of existing countermeasures such as signature-based and anomaly-based detection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.