Smartphone malware detection: From a survey towards taxonomy

Smartphone malwares are serious threat. Malware detector is the primary tool to protect Smartphones against malwares. The malware detector efficiency is based on the technique it uses. In this paper, we survey the current state of the art of Smartphone malware detection techniques. Those techniques have been classified into a structured taxonomy based on 3 rules. Those rules are inferred and compiled from literature review. The rules are: reference behaviour, analysis approach and malware behaviour representation. According to reference behaviour rule, Smartphone malware detection techniques divided into two main classes: signature-based and anomaly-based. In side these classes, ramifications are then derived according to analysis approach rule and malware behaviour representation rule.

[1]  Beate Commentz-Walter,et al.  A String Matching Algorithm Fast on the Average , 1979, ICALP.

[2]  Aditya P. Mathur,et al.  A Survey of Malware Detection Techniques , 2007 .

[3]  Sahin Albayrak,et al.  Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..

[4]  Sahin Albayrak,et al.  Static Analysis of Executables for Collaborative Malware Detection on Android , 2009, 2009 IEEE International Conference on Communications.

[5]  Swarat Chaudhuri,et al.  A Study of Android Application Security , 2011, USENIX Security Symposium.

[6]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[7]  Songwu Lu,et al.  SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.

[8]  Wu Di,et al.  Improving Wu-Manber: A Multi-pattern Matching Algorithm , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.

[9]  Ali A. Ghorbani,et al.  Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..

[10]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[11]  Sahin Albayrak,et al.  Detecting Symbian OS malware through static function call analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[12]  David Brumley,et al.  SplitScreen: Enabling efficient, distributed malware detection , 2010, Journal of Communications and Networks.

[13]  Kang G. Shin,et al.  Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.

[14]  Alfred V. Aho,et al.  Efficient string matching , 1975, Commun. ACM.

[15]  Kang G. Shin,et al.  Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.

[16]  George Varghese,et al.  Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.

[17]  Robert Layton,et al.  Malware Detection Based on Structural and Behavioural Features of API Calls , 2010 .

[18]  Sahin Albayrak,et al.  Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications , 2011, 2011 6th International Conference on Malicious and Unwanted Software.

[19]  Hongli Zhang,et al.  A Memory-Efficient Multi-pattern Matching Algorithm Based on the Bitmap , 2009, 2009 Fourth International Conference on Internet Computing for Science and Engineering.

[20]  Jan van Lunteren,et al.  High-Performance Pattern-Matching for Intrusion Detection , 2006, INFOCOM.

[21]  Eric Filiol,et al.  Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.

[22]  Tao Wei,et al.  Behavior-Based Malware Detection on Mobile Phone , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[23]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[24]  Somesh Jha,et al.  Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.

[25]  Joseph G. Tront,et al.  Mobile Device Profiling and Intrusion Detection Using Smart Batteries , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[26]  Survey on Malware Detection Methods , 2009 .

[27]  Udi Manber,et al.  A FAST ALGORITHM FOR MULTI-PATTERN SEARCHING , 1999 .