TITLE

Enhanced Detection System of Android Malware

AUTHOR(S)
Hyun Mi Jung; Kimoon Jeong; Hark-Soo Park
PUB. DATE
June 2014
SOURCE
Advances in Natural & Applied Sciences;Jun2014, Vol. 8 Issue 6, p654
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Recently, mobile malware on Android platform is proliferating. Android malware makes a malicious code installed on mobile devices, using SMS, and then send an attacker the user personal information stored on the mobile devices, such as phone numbers and credit card details. But almost Android anti-virus has high false-positive detection of Android malware. In order to overcome the limitations for collecting and analyzing Android malware, we propose a new method that it is collected by existing method. We propose a framework to overcome the limitation by anti-virus.
ACCESSION #
97105801

 

Related Articles

  • Malware Can now spread to Multiple Android Phones.  // Bank Security Report;Oct2013, Vol. 42 Issue 10, p5 

    The article looks at the malware Obad.a Trojan and its impact on Android smartphones. This Trojan can affect a phone handset of a user and can spread through text messages, where it can cause data breaches by revealing and corrupting user private data. Banks can manage or stop risks related to...

  • Android platform-based individual privacy information protection system. Zhang, Weizhe; Li, Xiong; Xiong, Naixue; Vasilakos, Athanasios // Personal & Ubiquitous Computing;Nov2016, Vol. 20 Issue 6, p875 

    With the popularity of mobile phones with Android platform, Android platform-based individual privacy information protection has been paid more attention to. In consideration of individual privacy information problem after mobile phones are lost, this paper tried to use SMS for remote control of...

  • What you see predicts what you get-lightweight agent-based malware detection. Wang, Wei; Murynets, Ilona; Bickford, Jeffrey; Wart, Christopher Van; Xu, Gang // Security & Communication Networks;Jan2013, Vol. 6 Issue 1, p33 

    ABSTRACT Because of the always connected nature of mobile devices, as well as the unique interfaces they expose, such as short message service (SMS), multimedia messaging service (MMS), and Bluetooth, classes of mobile malware tend to propagate using means unseen in the desktop world. In this...

  • ANNs on Co-occurrence Matrices for Mobile Malware Detection. Xi Xiao; Zhenlong Wang; Qi Li; Qing Li; Yong Jiang // KSII Transactions on Internet & Information Systems;Jul2015, Vol. 9 Issue 7, p2736 

    Android dominates the mobile operating system market, which stimulates the rapid spread of mobile malware. It is quite challenging to detect mobile malware. System call sequence analysis is widely used to identify malware. However, the malware detection accuracy of existing approaches is not...

  • Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It. Hieu Le Thanh // Journal of Information Security;Oct2013, Vol. 4 Issue 4, p213 

    The sale of products using the android Operation System (OS) phone is increasing in rate: the fact is that its price is cheaper but its configured hardware is higher, users easily buy it and the approach to this product increases the risk of the spread of mobile malware. The understanding of...

  • Android Antivirus Scanner by Analyzing Operation Codes. Narang, Komal; Kingkarn Sookhanaphibarn; Prasong Praneetpolgrang // Applied Mechanics & Materials;2015, Vol. 781, p145 

    This research presents a model for malware detection on mobile operating system based on analyzing the operation codes. The research processes are as follows: (1) collecting of both malicious and benign codes on android operating system, (2) extracting features based on the distribution of...

  • Mobile Security Tools. Saini, Shumpy // PC Quest;May2012, p50 

    The article offers in formation on several computer applications that can protect computer devices from theft or malware attack. Suggested is the use of security software other from anti-virus or firewall as it features remote wipe, mobile tracker, and SIM lock. Also indicated is the importance...

  • Research on android malware permission pattern using permission monitoring system. Ju, Seung-hwan; Seo, Hee-suk; Kwak, Jin // Multimedia Tools & Applications;Nov2016, Vol. 75 Issue 22, p14807 

    Mobile anti-viruses used mainly are the reverse engineering-based analysis and the sandbox-based analysis. There methods can analyze in detail. But, they take a lot of time and have a one-time payout. This study investigates the permissions requested by Android applications, and the possibility...

  • Toward a Taxonomy of Malware Behaviors. ABED GRÉGIO, ANDRÉ RICARDO; MONTE AFONSO, VITOR; FERNANDES FILHO, DARIO SIMÕES; DE GEUS, PAULO LÍCIO; JINO, MARIO // Computer Journal;Oct2015, Vol. 58 Issue 10, p2758 

    Malicious code attacks pose a serious threat to the security of information systems, as malware evolved from innocuous conceptual software to advanced and destructive cyber weapons. However, there is still the lack of a comprehensive and useful taxonomy to classify malware according to their...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics