DocumentCode
145377
Title
A Survey of Android Malware Characterisitics and Mitigation Techniques
Author
Cooper, Vanessa N. ; Shahriar, Hossain ; Haddad, Hisham M.
Author_Institution
Dept. of Comput. Sci., Kennesaw State Univ., Kennesaw, GA, USA
fYear
2014
fDate
7-9 April 2014
Firstpage
327
Lastpage
332
Abstract
As mobile applications are being developed at a faster pace, the security aspect of is being neglected. A solid understanding of the characteristics of malware is the first step to preventing many unwanted consequences. This paper provides an overview of popular security threats posed by Android malware. In particular, we focus on the characteristics commonly found in malware applications and understand the code level features that can enable detection techniques. We also discuss some common defense techniques to mitigate the impact of malware applications.
Keywords
Android (operating system); invasive software; mobile computing; smart phones; Android malware characterisitics; code level features; defense technique; detection technique; malware mitigation technique; mobile applications; security threats; Kernel; Libraries; Malware; Mobile communication; Smart phones; Social network services; Android Malware; Mobile application; Mobile security; Software Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology: New Generations (ITNG), 2014 11th International Conference on
Conference_Location
Las Vegas, NV
Print_ISBN
978-1-4799-3187-3
Type
conf
DOI
10.1109/ITNG.2014.71
Filename
6822218
Link To Document