作者
Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro
发表日期
2017/1/13
来源
ACM Computing Surveys (CSUR)
卷号
49
期号
4
页码范围
1-41
出版商
ACM
简介
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.
引用总数
201720182019202020212022202320242969627287594920
学术搜索中的文章
K Tam, A Feizollah, NB Anuar, R Salleh, L Cavallaro - ACM Computing Surveys (CSUR), 2017