作者
Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro
发表日期
2017/1
期刊
ACM Computing Surveys
卷号
49
期号
4
页码范围
1-41
简介
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.
引用总数
201720182019202020212022202320242970637187625127
学术搜索中的文章
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro - ACM Computing Surveys (CSUR), 2017