On the effectiveness of malware protection on Android (original) (raw)
Related papers
Android application security: detecting Android malware and evaluating anti-malware software
International Journal of Internet Technology and Secured Transactions, 2020
Mobile devices have become widespread computing technology, people prefer to use than desktop devices. These connected devices and their features like an exchange of data, video calling etc. have made our lives simple but, this has also increased data security concerns. At present, Google's Android is dominating the market share of mobile devices; as a result, it has become a big target for malware writers. Android users can download applications from official or third-party stores. Google implements various security policies to ensure secure distribution of applications but third-party application stores have less efficient or no such policies. This makes such markets more attractive for malware writers. This paper investigates Android application security by analysing 1,946 free most downloaded Android applications in the year 2016: 1,300 from Google Play Store and 646 from third-party Android applications. 100 samples from 33 different malware families (with variants) prominent in the Android market during January 2016 to April 2016 were also collected that acted as a template for malware detection. Further, based on detected malware samples, an evaluation-based study on ten anti-malware applications is performed to identify how well they protect users from malware.
Research in Progress-Defending Android Smartphones from Malware Attacks
2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), 2013
Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. The survey also intended to study the scope of malware attacks targeting Android phones and the effectiveness of existing defense measures. The study surveyed the average Android users as the target population to understand how they perceive security and what security controls they use to protect their smart phones.
Comparing the Efficiency of Malware Detection in Android System
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
Personal Digital Assistants are becoming fundamental in our lives. Android is perhaps the most well-known working framework. Android OS is far-reaching in the portable business today due to its easy and comprehensive engineering. Application clients will generally trust the Android Operating System to get information; however, it is being demonstrated that Android is more defenseless and eccentric. of concern. As a result of its open-source design, the Android OS is endless in the versatile business today. It is a wide assortment of uses and essential highlights. Application clients generally prefer Android OS to get information. It has been accounted that the increasing number of android devices will increase the number of malware threats and the research work on malware is the trending topic in the security field. This paper plans to break down the different qualities associated with malware identification. It also addresses malware location strategies. The ongoing identification system uses Bayesian calculation, Ada graduate calculation, Naïve Bayes calculation, Hybrid calculation, and other calculation methods for AI to prepare the sets and find the malware.
IJERT-Comparison of Malware Detection Techniques for Windows and Android Devices
International Journal of Engineering Research and Technology (IJERT), 2020
https://www.ijert.org/comparison-of-malware-detection-techniques-for-windows-and-android-devices https://www.ijert.org/research/comparison-of-malware-detection-techniques-for-windows-and-android-devices-IJERTV9IS070060.pdf Malware refers to malicious software perpetrators dispatch to infect individual computers or an entire organization's network. It exploits target system vulnerabilities, such as a bug in legitimate software.A malware infection can cause many problems that affect daily operation and the long-term security of a system.Malware is not a single entity but it comes in various forms and each has it's own wayof entering and corrupting the systemfor example Virus, Worms, Trojans, Ransomware are various types of malware having different families. The aim of my research is to identify the existence of malware in Windows executable files and Mobile android devices in my first research the aim is to detect a malware in an android mobile device and in the second research the aim is to detect the malware in Windows executable files. This paper compares both the techniques and pros and cons of using each technique for malware detection
ANDROID MOBILE PLATFORM SECURITY AND MALWARE SURVEY
As mobile devices become ubiquitous, more people and companies are readily adopting the technology to conduct day-today business, and are increasing the amount of personal data transmitted and stored on these devices. These devices are now part of a global infrastructure powering communication and how we do business around the world. In turn, the inherent vulnerabilities are becoming an ever more critical topic of interest and challenge as we continue to see a rapid rate of malware development. This paper is a comprehensive survey on a broad view of the growing Android community, its rapidly growing malware attacks, and security concerns. Serving to aid in the continuous challenge of identifying current and future vulnerabilities as well as incorporating security strategies against them, this survey will focus primarily on mobile devices (also known as smart phones) running the Android mobile operating system between the years of 2007 and 2013.
Efficiency of Malware Detection in Android System: A Survey
Asian Journal of Research in Computer Science, 2021
Smart phones are becoming essential in our lives, and Android is one of the most popular operating systems. Android OS is wide-ranging in the mobile industry today because of its open-source architecture. It is a wide variety of applications and basic features. App users tend to trust Android OS to secure data, but it has been shown that Android is more vulnerable and unstable. Identification of Android OS malware has become an emerging research subject of concern. This paper aims to analyze the various characteristics involved in malware detection. It also addresses malware detection methods. The current detection mechanism utilizes algorithms such as Bayesian algorithm, Ada grad algorithm, Naïve Bayes algorithm, Hybrid algorithm, and other algorithms for machine learning to train the sets and find the malware.
Journal of Information Security, 2013
The sale of products using the android Operation System (OS) phone is increasing in rate: the fact is that its price is cheaper but its configured hardware is higher, users easily buy it and the approach to this product increases the risk of the spread of mobile malware. The understanding of majority of the users of this mobile malware is still limited. While they are growing at a faster speed in the number and level of sophistication, especially their variations have created confusion for users; therefore worrying about the safety of its users is required. In this paper, the author discussed the identification and analysis of malware families on Android Mobiles. The author selected the recognizable characteristics from ordinary users with their families collected from 58 malware families and 1485 malware samples and proposed solutions as recommendations to users before installing it with the ultimate desire to mitigate the damage in the community that is on the android phone, especially the ordinary users with limited understanding about potential hazards. It would be helpful for the ordinary users to identify the mobile malware in order to mitigate the information security risk.
Android Malware Detection And Prevention
International Journal of Recent Trends in Engineering and Research, 2017
As the growth of internet and technology is increasing day by day, the use of smartphones, computers, tablets are also increasing rapidly. In the smartphone, Market among the other operating systems android smartphones are generally preferred by the many of the people. As android smartphones are easy to use and operate. Nevertheless, everything has two aspects smartphones bring so much convenience for the people at the same time it also brings security threat. Malicious application has a big threat to the mobile security. Thus, an efficiency security analysis and detection method is important and necessary. this paper detects and prevent the malicious attacks which are threat to mobile security.
A Preface on Android Malware: Taxonomy, Techniques and Tools
— Android OS has an open architecture and provides Application Programming Interface (APIs)enabling it to earn a huge market share and interest in the developer community. Android has become the most well-liked smartphone Operating System in current digital world. With the increased popularity of Android devices and open source features the malware threat has also increased. Android mobile operating system applications have right to use to a lot of personal information when granted certain permissions at the time of app installation. Apps can have access to the contacts, e-mails, can track the physical location, access gallery, and others. Due to this reason, Android users are looking for better security solutions to protect their smartphones from malicious actions. To cope up with this exponential growth of mobile users and malware threats, we have presented and analyzed Android malware trends till 2016 and continuous growth in malware till first quarter of May 2017. To clinch, we have summarized Android malware detection techniques.
A Review on Android Malware: Attacks, Countermeasures and Challenges Ahead
Journal of Cyber Security and Mobility, 2021
Smartphones usage have become ubiquitous in modern life serving as a double-edged sword with opportunities and challenges in it. Along with the benefits, smartphones also have high exposure to malware. Malware has progressively penetrated thereby causing more turbulence. Malware authors have become increasingly sophisticated and are able to evade detection by anti-malware engines. This has led to a constant arms race between malware authors and malware defenders. This survey converges on Android malware and covers a walkthrough of the various obfuscation attacks deployed during malware analysis phase along with the myriad of adversarial attacks operated at malware detection phase. The review also unscrambles the difficulties currently faced in deploying an on-device, lightweight malware detector. It sheds spotlight for researchers to perceive the current state of the art techniques available to fend off malware along with suggestions on possible future directions