A Review of Malicious Code Detection Techniques for Mobile Devices

@article{Ketari2012ARO,
  title={A Review of Malicious Code Detection Techniques for Mobile Devices},
  author={Lamia Mohammed Ketari and Mohammadi Akheela Khanum},
  journal={International Journal of Computer Theory and Engineering},
  year={2012},
  pages={212-216}
}
  • L. Ketari, M. A. Khanum
  • Published 2012
  • Computer Science
  • International Journal of Computer Theory and Engineering
—With the advent and rising popularity of wireless systems, there is a proliferation of small-enabled devices such as PDAs, mobile phones, etc. While these devices are becoming more and more preferable by all age groups, they also pose the threat of being vulnerable to malicious code (e.g.: viruses, trojans, worms, etc). In fact, the mobile devices rely on open and public transmission media. Besides, open platforms are becoming popular in smart phones. In this context, these devices have become… 

Figures from this paper

Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones
TLDR
An overview of the research in the field of intrusion detection techniques for the Android platform is given and a set of guidelines that could help researchers to avoid common pitfalls and improve the quality of their work are presented.
The Network Model to Prevent the Mobile Malware in the Distributed Environment
  • N. Sundareswaran, P. Vinoth
  • Computer Science
    2014 3rd International Conference on Eco-friendly Computing and Communication Systems
  • 2014
TLDR
The research problem is to deploy an efficient preventing system to help infected nodes to recover from further infection and co-location of multiple virtual machines and sharing the same resources increase the speed of analysis.
COMPREHENSIVE STUDY AND ANALYSIS OF MALICIOUS WEBSITE DETECTION TECHNIQUES
TLDR
A comprehensive study with the literature of Malicious Website detection techniques, selecting articles that had the word “malicious detection” in its title or as its keyword published between January 2003 to august 2016 to give an elaborate idea about malicious detection.
Negative Selection Algorithm Based Unknown Malware Detection Model
TLDR
A new scheme with online adaptive learning is introduced to NSA, and it includes that constructing the appropriate profile of the system, generating new detectors cover the holes of the non-self space, deleting detectors which lie in the self-space decreases false alarms and amending these detectors which cover partly self- space decreases false alarm and increase detecting rate.
Survey in Smartphone Malware Analysis Techniques
TLDR
This chapter surveys various approaches used in Smartphone malware detection and Investigates weaknesses of existing countermeasures such as signature-based and anomaly-based detection.

References

SHOWING 1-10 OF 15 REFERENCES
On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones
TLDR
This study shows that the functionality limitations of mobile phones should be considered as advantages as they have significant impact on shrinking the living space of mobile malware.
Detecting energy-greedy anomalies and mobile malware variants
TLDR
A power-aware malware-detection framework that monitors, detects, and analyzes previously unknown energy-depletion threats and achieves significant storage-savings without losing the detection accuracy, and a 99% true-positive rate in classifying mobile malware.
SmartSiren: virus detection and alert for smartphones
TLDR
SmartSiren is presented, a collaborative virusdetection and alert system for smartphones that uses a proxy-based architecture to offload the processing burden from resource-constrained smartphones and simplify the collaboration among smartphones.
Mobile phones as computing devices: the viruses are coming!
TLDR
This work presents a taxonomy of attacks against mobile phones that shows known as well as potential attacks, and describes viruses, worms, and trojans specifically designed for the mobile environment.
Towards Dynamic Malware Analysis to Increase Mobile Device Security423
TLDR
The implementation of a dynamic analysis module of the monitoring system has the task of performing the dynamic analysis by transferring common sandboxing approaches to the Windows Mobile operating system on the ARM architecture.
An efficient signature representation and matching method for mobile devices
TLDR
A virus scanning system on mobile devices using a signature based detection method that aims to optimize scanning speed and memory usage which are both very important considerations for the low memory and low power mobile devices.
pBMDS: a behavior-based malware detection system for cellphone devices
TLDR
A novel behavior-based malware detection system named pBMDS, which adopts a probabilistic approach through correlating user inputs with system calls to detect anomalous activities in cellphones and achieves high detection accuracy and low false positive rates in protecting major applications in smartphones.
Is It Finally Time to Worry about Mobile Malware?
TLDR
There have been far fewer smart mobile devices than PCs, making desktops much more attractive targets, and the lack of technical sophistication has provided hackers with fewer ways to attack them.
Paranoid Android: versatile protection for smartphones
TLDR
This work implemented a prototype of this security model for Android phones, and shows that it is both practical and scalable: it is able to support more than a hundred replicas running on a single server.
Monitoring Smartphones for Anomaly Detection
TLDR
This paper demonstrates how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection and introduces the top ten applications used by mobile phone users based on a study in 2005.
...
...