• DocumentCode
    145377
  • Title

    A Survey of Android Malware Characterisitics and Mitigation Techniques

  • Author

    Cooper, Vanessa N. ; Shahriar, Hossain ; Haddad, Hisham M.

  • Author_Institution
    Dept. of Comput. Sci., Kennesaw State Univ., Kennesaw, GA, USA
  • fYear
    2014
  • fDate
    7-9 April 2014
  • Firstpage
    327
  • Lastpage
    332
  • Abstract
    As mobile applications are being developed at a faster pace, the security aspect of is being neglected. A solid understanding of the characteristics of malware is the first step to preventing many unwanted consequences. This paper provides an overview of popular security threats posed by Android malware. In particular, we focus on the characteristics commonly found in malware applications and understand the code level features that can enable detection techniques. We also discuss some common defense techniques to mitigate the impact of malware applications.
  • Keywords
    Android (operating system); invasive software; mobile computing; smart phones; Android malware characterisitics; code level features; defense technique; detection technique; malware mitigation technique; mobile applications; security threats; Kernel; Libraries; Malware; Mobile communication; Smart phones; Social network services; Android Malware; Mobile application; Mobile security; Software Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology: New Generations (ITNG), 2014 11th International Conference on
  • Conference_Location
    Las Vegas, NV
  • Print_ISBN
    978-1-4799-3187-3
  • Type

    conf

  • DOI
    10.1109/ITNG.2014.71
  • Filename
    6822218