S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
… the target and victim of malware writers. Motivated by the … users, we survey the current smartphonemalware status and … smartphones increases their vulnerability to malwareattacks. …
… This study sheds light on the current research efforts … smartphone security, maps the extant malware-related studies to the … defending smartphone users from malwareattacks, monitoring …
… The popularity of Android smartphones is not hidden from malware authors to penetrate the security of mobile devices through malicious applications. G-DATA security blog [3], reported …
… After observing that 4 pieces of malware use root exploits to mount sophisticated attacks on … smartphone tinkerers to publish root exploits and survey the availability of root exploits. …
… of malware development in smartphone platforms by average programmers that have access to the official tools and programming libraries provided by smartphone … -known smartphone …
… This technique can detect unknown malwares and zero-day attacks. However this technique is a costly approach in term of memory usage, communication traffic, CPU computation, and …
M Omar, M Dawson - 2013 third international conference on …, 2013 - ieeexplore.ieee.org
… Android smartphones. The survey also intended to study the scope of malwareattacks … The studysurveyed the average Android users as the target population to understand how …
… smartphones from malwareattacks and other security threats. In this paper, we present a survey of techniques that are used to detect mobile malware in … tips to protect smartphones from …
P Faruki, A Bharmal, V Laxmi… - … surveys & tutorials, 2014 - ieeexplore.ieee.org
… on smartphone sensor feature based misuse attacks such as … Authors categorized the malware based on their attack goals… the malware according to the commercial anti-malware …