The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Les appareils mobiles modernes sont équipés d’une variété d’outils et de services et traitent des quantités croissantes d’informations sensibles. Dans la même tendance, le nombre de vulnérabilités exploitant les appareils mobiles augmente également quotidiennement et, sans aucun doute, les plates-formes mobiles populaires, telles qu'Android et iOS, représentent une cible séduisante pour les auteurs de logiciels malveillants. Alors que les chercheurs s'efforcent de trouver des approches alternatives de détection pour lutter contre les logiciels malveillants mobiles, des rapports récents révèlent une augmentation alarmante du nombre de logiciels malveillants mobiles exploitant leurs victimes pour générer des revenus, ce qui représente une industrie d'un milliard de dollars. Les approches actuelles en matière d'analyse et de détection des logiciels malveillants mobiles ne peuvent pas toujours suivre le rythme de la sophistication future des logiciels malveillants [2],[4]. L'objectif de ce travail est de fournir un aperçu structuré et complet des dernières recherches sur les techniques de détection des logiciels malveillants mobiles et d'identifier leurs avantages et leurs limites.
Vasileios KOULIARIDIS
University of Aegean
Konstantia BARMPATSALOU
Coimbra
Georgios KAMBOURAKIS
Joint Research Centre (JRC)
Shuhong CHEN
Guangzhou University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Vasileios KOULIARIDIS, Konstantia BARMPATSALOU, Georgios KAMBOURAKIS, Shuhong CHEN, "A Survey on Mobile Malware Detection Techniques" in IEICE TRANSACTIONS on Information,
vol. E103-D, no. 2, pp. 204-211, February 2020, doi: 10.1587/transinf.2019INI0003.
Abstract: Modern mobile devices are equipped with a variety of tools and services, and handle increasing amounts of sensitive information. In the same trend, the number of vulnerabilities exploiting mobile devices are also augmented on a daily basis and, undoubtedly, popular mobile platforms, such as Android and iOS, represent an alluring target for malware writers. While researchers strive to find alternative detection approaches to fight against mobile malware, recent reports exhibit an alarming increase in mobile malware exploiting victims to create revenues, climbing towards a billion-dollar industry. Current approaches to mobile malware analysis and detection cannot always keep up with future malware sophistication [2],[4]. The aim of this work is to provide a structured and comprehensive overview of the latest research on mobile malware detection techniques and pinpoint their benefits and limitations.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2019INI0003/_p
Copier
@ARTICLE{e103-d_2_204,
author={Vasileios KOULIARIDIS, Konstantia BARMPATSALOU, Georgios KAMBOURAKIS, Shuhong CHEN, },
journal={IEICE TRANSACTIONS on Information},
title={A Survey on Mobile Malware Detection Techniques},
year={2020},
volume={E103-D},
number={2},
pages={204-211},
abstract={Modern mobile devices are equipped with a variety of tools and services, and handle increasing amounts of sensitive information. In the same trend, the number of vulnerabilities exploiting mobile devices are also augmented on a daily basis and, undoubtedly, popular mobile platforms, such as Android and iOS, represent an alluring target for malware writers. While researchers strive to find alternative detection approaches to fight against mobile malware, recent reports exhibit an alarming increase in mobile malware exploiting victims to create revenues, climbing towards a billion-dollar industry. Current approaches to mobile malware analysis and detection cannot always keep up with future malware sophistication [2],[4]. The aim of this work is to provide a structured and comprehensive overview of the latest research on mobile malware detection techniques and pinpoint their benefits and limitations.},
keywords={},
doi={10.1587/transinf.2019INI0003},
ISSN={1745-1361},
month={February},}
Copier
TY - JOUR
TI - A Survey on Mobile Malware Detection Techniques
T2 - IEICE TRANSACTIONS on Information
SP - 204
EP - 211
AU - Vasileios KOULIARIDIS
AU - Konstantia BARMPATSALOU
AU - Georgios KAMBOURAKIS
AU - Shuhong CHEN
PY - 2020
DO - 10.1587/transinf.2019INI0003
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E103-D
IS - 2
JA - IEICE TRANSACTIONS on Information
Y1 - February 2020
AB - Modern mobile devices are equipped with a variety of tools and services, and handle increasing amounts of sensitive information. In the same trend, the number of vulnerabilities exploiting mobile devices are also augmented on a daily basis and, undoubtedly, popular mobile platforms, such as Android and iOS, represent an alluring target for malware writers. While researchers strive to find alternative detection approaches to fight against mobile malware, recent reports exhibit an alarming increase in mobile malware exploiting victims to create revenues, climbing towards a billion-dollar industry. Current approaches to mobile malware analysis and detection cannot always keep up with future malware sophistication [2],[4]. The aim of this work is to provide a structured and comprehensive overview of the latest research on mobile malware detection techniques and pinpoint their benefits and limitations.
ER -