Evolution, Detection and Analysis of Malware for Smart Devices

@article{SuarezTangil2014EvolutionDA,
  title={Evolution, Detection and Analysis of Malware for Smart Devices},
  author={Guillermo Suarez-Tangil and J. Tapiador and Pedro Peris-Lopez and A. Ribagorda},
  journal={IEEE Communications Surveys & Tutorials},
  year={2014},
  volume={16},
  pages={961-987}
}
Smart devices equipped with powerful sensing, computing and networking capabilities have proliferated lately, ranging from popular smartphones and tablets to Internet appliances, smart TVs, and others that will soon appear (e.g., watches, glasses, and clothes. [...] Key Method We identify exhibited behaviors, pursued goals, infection and distribution strategies, etc. and provide numerous examples through case studies of the most relevant specimens.Expand
210 Citations
Cloud-based malware analysis system for smart phones
Smartphone nabbing: Analysis of intrusion detection and prevention systems
  • Sonakshi Vij, A. Jain
  • Computer Science
  • 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)
  • 2016
  • 2
SpotMal: A hybrid malware detection framework with privacy protection for BYOD
  • 1
Smart malware detection on Android
  • 11
A study of android malware detection technology evolution
  • 11
  • Highly Influenced
Protecting contacts against privacy leaks in smartphones
  • 3
  • PDF
Investigating Android permissions and intents for malware detection
  • 3
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 196 REFERENCES
Detection of Smartphone Malware
  • 20
  • PDF
Detecting energy-greedy anomalies and mobile malware variants
  • 291
  • Highly Influential
  • PDF
A Survey on Security for Mobile Devices
  • 483
  • PDF
Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications
  • 141
  • PDF
Dissecting Android Malware: Characterization and Evolution
  • Y. Zhou, X. Jiang
  • Computer Science
  • 2012 IEEE Symposium on Security and Privacy
  • 2012
  • 1,883
  • Highly Influential
  • PDF
An Android Application Sandbox system for suspicious software detection
  • 459
  • Highly Influential
  • PDF
Mobile Malware Attacks and Defense
  • 64
PiOS: Detecting Privacy Leaks in iOS Applications
  • 507
  • Highly Influential
  • PDF
MADAM: A Multi-level Anomaly Detector for Android Malware
  • 211
  • Highly Influential
  • PDF
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones
  • 49
  • PDF
...
1
2
3
4
5
...