Comprehensive review and analysis of anti-malware apps for smartphones

The new and disruptive technologies for ensuring smartphone security are very limited and largely scattered. The available options and gaps in this research area must be analysed to provide valuable insights about the present technological environment. This work illustrates the research landscape by mapping the existing literature to a comprehensive taxonomy with four categories. The first category includes review and survey articles related to smartphone security. The second category includes papers on smartphone security solutions. The third category includes smartphone malware studies that examine the security aspects of smartphones and the threats posed by malware. The fourth category includes ranking, clustering and classification studies that classify malware based on their families or security risk levels. Several smartphone security apps have also been analysed and compared based on their mechanisms to identify their contents and distinguishing features by using several evaluation metrics and parameters. Two malware detection techniques, namely, machine-learning-based and non-machine-learning-based malware detection, are drawn from the review. The basic characteristics of this emerging field of research are discussed in the following aspects: (1) motivation behind the development of security measures for different smartphone operating system (Oss), (2) open challenges that compromise the usability and personal information of users and (3) recommendations for enhancing smartphone security. This work also reviews the functionalities and services of several anti-malware companies to fully reveal their security mechanisms, features and strategies. This work also highlights the open challenges and issues related to the evaluation and benchmarking of malware detection techniques to identify the best malware detection apps for smartphones.

[1]  Heejo Lee,et al.  Screening smartphone applications using malware family signatures , 2015, Comput. Secur..

[2]  Jean-Marc Robert,et al.  Performance Evaluation of Multi-pattern Matching Algorithms on Smartphone , 2012, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications.

[3]  Tao Guo,et al.  A behavior analysis based Mobile Malware Defense System , 2012, ICSPCS.

[4]  Muneer Ahmad Dar A novel approach to restrict the access of malicious applications in android , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[5]  Jonghyun Baek,et al.  Secure and Lightweight Authentication Protocol for NFC Tag Based Services , 2015, 2015 10th Asia Joint Conference on Information Security.

[6]  Heejo Lee,et al.  Screening Smartphone Applications Using Behavioral Signatures , 2013, SEC.

[7]  Qiaoyan Wen,et al.  A cloud-based system for enhancing security of Android devices , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[8]  Thomas Zefferer,et al.  Android - On-device detection of SMS catchers and sniffers , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[9]  Alessandro Armando,et al.  Android vs. SEAndroid: An empirical assessment , 2016, Pervasive Mob. Comput..

[10]  Jiayi Mu,et al.  Android Mobile Security – Threats and Protection , 2013 .

[11]  Rubayyi Alghamdi,et al.  Android Platform Malware Analysis , 2015 .

[12]  Dea-Woo Park,et al.  Malicious code hiding android APP's distribution and hacking attacks and incident analysis , 2012, 2012 8th International Conference on Information Science and Digital Content Technology (ICIDT2012).

[13]  Shin-Ming Cheng,et al.  Modeling Dynamics of Malware with Incubation Period from the View of Individual , 2014, 2014 IEEE 79th Vehicular Technology Conference (VTC Spring).

[14]  Dimitris Gritzalis,et al.  On the Feasibility of Malware Attacks in Smartphone Platforms , 2011, ICETE.

[15]  Myung-Sup Kim,et al.  Linear SVM-Based Android Malware Detection for Reliable IoT Services , 2014, J. Appl. Math..

[16]  Sasu Tarkoma,et al.  MDoctor: A Mobile Malware Prognosis Application , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems Workshops (ICDCSW).

[17]  Neil McBride,et al.  Human in the loop , 2020, Journal of Information Technology.

[18]  Matthew Might,et al.  AnaDroid: Malware Analysis of Android with User-supplied Predicates , 2015, Electron. Notes Theor. Comput. Sci..

[19]  Santosh Kumar Singh,et al.  Analysis of Malicious Behavior of Android Apps , 2016 .

[20]  Jae-Kyung Park,et al.  Studying Security Weaknesses of Android System , 2015 .

[21]  Jiaming He,et al.  Extending Android Security Enforcement with a Security Distance Model , 2011, 2011 International Conference on Internet Technology and Applications.

[22]  Xinshuai Zhang,et al.  An efficient method of detecting repackaged android applications , 2014 .

[23]  Igor Bernik,et al.  Safe use of mobile devices arises from knowing the threats , 2015, J. Inf. Secur. Appl..

[24]  Bhavani M. Thuraisingham,et al.  Randomizing Smartphone Malware Profiles against Statistical Mining Techniques , 2012, DBSec.

[25]  Cong-Cong Xing,et al.  A Novel Behavior-Based Virus Detection Method for Smart Mobile Terminals , 2012 .

[26]  Juan E. Tapiador,et al.  Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation , 2015, Pervasive Mob. Comput..

[27]  B. B. Zaidan,et al.  Technique for order performance by similarity to ideal solution for solving complex situations in multi-criteria optimization of the tracking channels of GPS baseband telecommunication receivers , 2018, Telecommun. Syst..

[28]  Woo Bong Cheon,et al.  The New Vulnerability of Service Set Identifier (SSID) Using QR Code in Android Phone , 2011, 2011 International Conference on Information Science and Applications.

[29]  Lance Chun Che Fung,et al.  An offensive containment strategy based on Malware's attack patterns , 2013, 2013 International Conference on Machine Learning and Cybernetics.

[30]  Shen Yi,et al.  Android Malware Detection Technology Based on Improved Bayesian Classification , 2013, 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[31]  Ching-Lai Hwang,et al.  Multiple attribute decision making : an introduction , 1995 .

[32]  A. A. Zaidan,et al.  A New Approach based on Multi-Dimensional Evaluation and Benchmarking for Data Hiding Techniques , 2017 .

[33]  Thomas Zefferer,et al.  Mobile Device Encryption Systems , 2013, SEC.

[34]  Mauro Conti,et al.  FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment , 2013, IEEE Transactions on Information Forensics and Security.

[35]  B. B. Zaidan,et al.  Based Real Time Remote Health Monitoring Systems: A Review on Patients Prioritization and Related "Big Data" Using Body Sensors information and Communication Technology , 2018, Journal of Medical Systems.

[36]  Muhamed Turkanovic,et al.  On the security of certain e-communication types: Risks, user awareness and recommendations , 2013, J. Inf. Secur. Appl..

[37]  Mark Stamp,et al.  Deriving common malware behavior through graph clustering , 2013, Comput. Secur..

[38]  Jingyu Hua,et al.  Botnet command and control based on Short Message Service and human mobility , 2013, Comput. Networks.

[39]  Rajiv Ranjan,et al.  An integrated static detection and analysis framework for android , 2016, Pervasive Mob. Comput..

[40]  R. Jayawardena,et al.  Validity of a food frequency questionnaire to assess nutritional intake among Sri Lankan adults , 2016, SpringerPlus.

[41]  R. C. Thool,et al.  A survey paper on vulnerabilities in android OS and security of android devices , 2014, 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN).

[42]  Kabakus Abdullah Talha,et al.  APK Auditor: Permission-based Android malware detection system , 2015 .

[43]  F. M. Jumaah,et al.  Decision-making solution based multi-measurement design parameter for optimization of GPS receiver tracking channels in static and dynamic real-time positioning multipath environment , 2018 .

[44]  Lipo Wang,et al.  Detecting Clones in Android Applications through Analyzing User Interfaces , 2015, 2015 IEEE 23rd International Conference on Program Comprehension.

[45]  Chetan Kotkar,et al.  Prevention mechanism for prohibiting SMS malware attack on android smartphone , 2015, 2015 Annual IEEE India Conference (INDICON).

[46]  Yuval Elovici,et al.  Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method , 2010, J. Syst. Softw..

[47]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[48]  Athanasios V. Vasilakos,et al.  Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..

[49]  K. I. Mohammed,et al.  Based Multiple Heterogeneous Wearable Sensors: A Smart Real-Time Health Monitoring Structured for Hospitals Distributor , 2019, IEEE Access.

[50]  Yuan Tian,et al.  UnLocIn: Unauthorized location inference on smartphones without being caught , 2013, 2013 International Conference on Privacy and Security in Mobile Systems (PRISMS).

[51]  B. B. Zaidan,et al.  Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects , 2018, Journal of Medical Systems.

[52]  Yury Chemerkin Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook) , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[53]  Kim-Kwang Raymond Choo,et al.  Exfiltrating data from Android devices , 2015, Comput. Secur..

[54]  Peng Liu,et al.  Leveraging Information Asymmetry to Transform Android Apps into Self-Defending Code Against Repackaging Attacks , 2018, IEEE Transactions on Mobile Computing.

[55]  Rida Khatoun,et al.  Clustering-based anomaly detection for smartphone applications , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[56]  Shivakant Mishra,et al.  Time and Location Power Based Malicious Code Detection Techniques for Smartphones , 2013, 2014 IEEE 13th International Symposium on Network Computing and Applications.

[57]  Christian Platzer,et al.  MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[58]  B. B. Zaidan,et al.  Evaluation and selection of open-source EMR software packages based on integrated AHP and TOPSIS , 2015, J. Biomed. Informatics.

[59]  Mauro Conti,et al.  Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models , 2014, ESORICS.

[60]  Won Ryu,et al.  A financial fraud protection platform on Android smartphones in real-time , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).

[61]  Md. Shohrab Hossain,et al.  Malware detection in Android by network traffic analysis , 2015, 2015 International Conference on Networking Systems and Security (NSysS).

[62]  Sougata Mukherjea,et al.  Securing Enterprise Data on Smartphones Using Run Time Information Flow Control , 2012, 2012 IEEE 13th International Conference on Mobile Data Management.

[63]  Yusep Rosmansyah,et al.  Android anomaly detection system using machine learning classification , 2015, 2015 International Conference on Electrical Engineering and Informatics (ICEEI).

[64]  Dimitris Gritzalis,et al.  Security Busters: Web browser security vs. rogue sites , 2015, Comput. Secur..

[65]  Hong Yang,et al.  An android malware dynamic detection method based on service call co-occurrence matrices , 2017, Ann. des Télécommunications.

[66]  Miguel Angel Ortiz Barrios,et al.  An integrated approach of AHP-DEMATEL methods applied for the selection of allied hospitals in outpatient service , 2016, Int. J. Medical Eng. Informatics.

[67]  Marin Silic,et al.  Emerging security threats for mobile platforms , 2011, 2011 Proceedings of the 34th International Convention MIPRO.

[68]  Maryam Var Naseri,et al.  A data collection approach for Mobile Botnet analysis and detection , 2014, 2014 IEEE Symposium on Wireless Technology and Applications (ISWTA).

[69]  Valérie Viet Triem Tong,et al.  GroddDroid: a gorilla for triggering malicious behaviors , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).

[70]  Jongmoo Choi,et al.  Unified security enhancement framework for the Android operating system , 2013, The Journal of Supercomputing.

[71]  R. Dhaya,et al.  Detecting software vulnerabilities in android using static analysis , 2014, 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies.

[72]  Juan E. Tapiador,et al.  Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families , 2014, Expert Syst. Appl..

[73]  Tae-Jin Lee,et al.  A study on behavior-based mobile malware analysis system against evasion techniques , 2016, 2016 International Conference on Information Networking (ICOIN).

[74]  Elisa Bertino,et al.  Detecting mobile malware threats to homeland security through static analysis , 2014, J. Netw. Comput. Appl..

[75]  Ayumu Kubota,et al.  Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[76]  V. Natarajan,et al.  Android based malware detection using a multifeature collaborative decision fusion approach , 2015, Neurocomputing.

[77]  Vijay Laxmi,et al.  AndroSimilar: Robust signature for detecting variants of Android malware , 2015, J. Inf. Secur. Appl..

[78]  Tao Wei,et al.  Behavior-Based Malware Detection on Mobile Phone , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).

[79]  B. B. Zaidan,et al.  Survey on fuzzy TOPSIS state-of-the-art between 2007 and 2017 , 2019, Comput. Oper. Res..

[80]  Yingjiu Li,et al.  Permission based Android security: Issues and countermeasures , 2014, Comput. Secur..

[81]  Giorgio Giacinto,et al.  Stealth attacks: An extended insight into the obfuscation effects on Android malware , 2015, Comput. Secur..

[82]  Seung-Hyun Seo,et al.  A Strengthened Android Signature Management Method , 2015, KSII Trans. Internet Inf. Syst..

[83]  I. Bernik,et al.  Blended threats to mobile devices on the rise , 2012, International Conference on Information Society (i-Society 2012).

[84]  M. Omar,et al.  Research in Progress - Defending Android Smartphones from Malware Attacks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[85]  Heloise Pieterse,et al.  Security steps for smartphone users , 2013, 2013 Information Security for South Africa.

[86]  Vijay Laxmi,et al.  DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.

[87]  Jean-Pierre Seifert,et al.  Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms , 2014, IEEE Transactions on Mobile Computing.

[88]  Simon N. Foley,et al.  MASON: Mobile autonomic security for network access controls , 2013, J. Inf. Secur. Appl..

[89]  Woei-Jiunn Tsaur,et al.  Identifying Smartphone Malware Using Data Mining Technology , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).

[90]  Sachin Shetty,et al.  Scalable detection of web malware on smartphones , 2015, 2015 International Conference on Information and Communication Technology Research (ICTRC).

[91]  Muhammet Baykara,et al.  A review of cloned mobile malware applications for android devices , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).

[92]  Madihah Mohd,et al.  Mobile Malware Classification via System Calls and Permission for GPS Exploitation , 2017 .

[93]  Biswajit Panja,et al.  Cybersecurity in banking and financial sector: Security analysis of a mobile banking application , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[94]  Ashutosh Saxena,et al.  A security analysis of smartphone data flow and feasible solutions for lawful interception , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[95]  Mustafa Hassan Saad,et al.  Android spyware disease and medication , 2015, 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec).

[96]  Igor Zhukov,et al.  Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices , 2013, 2013 5th IEEE International Conference on Broadband Network & Multimedia Technology.

[97]  B. B. Zaidan,et al.  Real-Time Remote Health-Monitoring Systems in a Medical Centre: A Review of the Provision of Healthcare Services-Based Body Sensor Information, Open Challenges and Methodological Aspects , 2018, Journal of Medical Systems.

[98]  Yung-Wei Kao,et al.  A study of android malware detection technology evolution , 2015, 2015 International Carnahan Conference on Security Technology (ICCST).

[99]  Yu Yang,et al.  Automated Detection and Analysis for Android Ransomware , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[100]  Woei-Jiunn Tsaur,et al.  Mobile Malware Behavioral Analysis and Preventive Strategy Using Ontology , 2010, 2010 IEEE Second International Conference on Social Computing.

[101]  B. B. Zaidan,et al.  Based on Real Time Remote Health Monitoring Systems: A New Approach for Prioritization “Large Scales Data” Patients with Chronic Heart Diseases Using Body Sensors and Communication Technology , 2018, Journal of Medical Systems.

[102]  Jean-Marc Robert,et al.  Enhancing malware detection for Android systems using a system call filtering and abstraction process , 2015, Secur. Commun. Networks.

[103]  S. Karthikeyan,et al.  A survey on rise of mobile malware and detection methods , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[104]  Ayman I. Kayssi,et al.  Mobile Apps identification based on network flows , 2018, Knowledge and Information Systems.

[105]  Min Wu,et al.  Containing smartphone worm propagation with an influence maximization algorithm , 2014, Comput. Networks.

[106]  Georgios Kambourakis,et al.  Exposing mobile malware from the inside (or what is your mobile app really doing?) , 2014, Peer-to-Peer Netw. Appl..

[107]  Dimitris Gritzalis,et al.  Smartphone security evaluation The malware attack case , 2011, Proceedings of the International Conference on Security and Cryptography.

[108]  Luiz Fernando Capretz,et al.  Reliability Models Applied to Mobile Applications , 2013, 2013 IEEE Seventh International Conference on Software Security and Reliability Companion.

[109]  Xuxian Jiang,et al.  Profiling user-trigger dependence for Android malware detection , 2015, Comput. Secur..

[110]  William H. Sanders,et al.  Secloud: A cloud-based comprehensive and lightweight security solution for smartphones , 2013, Comput. Secur..

[111]  Eva-Maria Nordström,et al.  Decision support for participatory forest planning using AHP and TOPSIS. , 2016 .

[112]  B. B. Zaidan,et al.  Novel Methodology for Triage and Prioritizing Using "Big Data" Patients with Chronic Heart Diseases Through Telemedicine Environmental , 2017, Int. J. Inf. Technol. Decis. Mak..

[113]  B. B. Zaidan,et al.  Electronic medical record systems: decision support examination framework for individual, security and privacy concerns using multi-perspective analysis , 2018, Health and Technology.

[114]  Sumit Sharma,et al.  Spyware Detection in Android Using Hybridization of Description Analysis, Permission Mapping and Interface Analysis☆ , 2015 .

[115]  Zhouguo Chen,et al.  Threat analysis of smart mobile device , 2014, 2014 XXXIth URSI General Assembly and Scientific Symposium (URSI GASS).

[116]  Xiaojiang Du,et al.  Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).

[117]  Majid Sarrafzadeh,et al.  Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[118]  Matthew Smith,et al.  Evaluating the threat of epidemic mobile malware , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[119]  Bharavi Mishra,et al.  Detecting intelligent malware on dynamic Android analysis environments , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[120]  Dongwoo Kim,et al.  StopBankun: Countermeasure of app replacement attack on Android , 2015, 2015 Seventh International Conference on Ubiquitous and Future Networks.

[121]  Thomas C. Schmidt,et al.  Vitamin C for your smartphone: the SKIMS approach for cooperativeand lightweight security at mobiles , 2012, SIGCOMM '12.

[122]  Jie Wu,et al.  CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[123]  Mahdi Karbasian,et al.  The application of ISM model in evaluating agile suppliers selection criteria and ranking suppliers using fuzzy TOPSIS-AHP methods , 2015, Expert Syst. Appl..

[124]  Shih-Hao Hung,et al.  Real-time and intelligent private data protection for the Android platform , 2015, Pervasive Mob. Comput..

[125]  Ali Feizollah,et al.  AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection , 2017, Comput. Secur..

[126]  Jonathan Zdziarski Identifying back doors, attack points, and surveillance mechanisms in iOS devices , 2014, Digit. Investig..

[127]  Kangbin Yim,et al.  Analysis on Maliciousness for Mobile Applications , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[128]  B. B. Zaidan,et al.  Multi-criteria analysis for OS-EMR software selection problem: A comparative study , 2015, Decis. Support Syst..

[129]  Albert B. Jeng,et al.  Android privacy , 2012, 2012 International Conference on Machine Learning and Cybernetics.

[130]  Brij B. Gupta,et al.  Android Applications Repackaging Detection Techniques for Smartphone Devices , 2016 .

[131]  Sakir Sezer,et al.  High accuracy android malware detection using ensemble learning , 2015, IET Inf. Secur..

[132]  Luo Xueming,et al.  Access Control Research Based on Trusted Computing Android Smartphone , 2013, 2013 Third International Conference on Intelligent System Design and Engineering Applications.

[133]  Yen-Lin Chen,et al.  DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile Apps , 2015, TrustCom 2015.

[134]  Anu Mary Chacko,et al.  Android malware detection a survey , 2017, 2017 IEEE International Conference on Circuits and Systems (ICCS).

[135]  Igor Nai Fovino,et al.  A Permission verification approach for android mobile applications , 2015, Comput. Secur..

[136]  Carol J. Fung,et al.  Dude, ask the experts!: Android resource access permission recommendation with RecDroid , 2015, 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM).

[137]  Jean-Marc Robert,et al.  Smartphone malware detection: From a survey towards taxonomy , 2012, 2012 7th International Conference on Malicious and Unwanted Software.

[138]  Sangho Lee,et al.  Assessment of malicious applications using permissions and enhanced user interfaces on Android , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.

[139]  A. A. Zaidan,et al.  Comparative study on the evaluation and benchmarking information hiding approaches based multi-measurement analysis using TOPSIS method with different normalisation, separation and context techniques , 2018 .

[140]  Zsuzsanna Helyes,et al.  Contribution of the galanin system to inflammation , 2015, SpringerPlus.

[141]  Ram Dantu,et al.  Another free app: Does it have the right intentions? , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[142]  Jong-Deok Choi,et al.  Fine-grained I/O access control based on xen virtualization for 3G/4G mobile devices , 2010, Design Automation Conference.

[143]  Song Yubo,et al.  Implementation of automated testing system for android applications based on dynamic taint propagation , 2014 .

[144]  Yanick Fratantonio,et al.  ANDRUBIS -- 1,000,000 Apps Later: A View on Current Android Malware Behaviors , 2014, 2014 Third International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

[145]  Guobin Xu,et al.  A study of malware detection on smart mobile devices , 2013, Defense, Security, and Sensing.

[146]  Jean-Pierre Seifert,et al.  SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms , 2010, ICICS.

[147]  B. B. Zaidan,et al.  Software and Hardware FPGA-Based Digital Watermarking and Steganography Approaches: Toward New Methodology for Evaluation and Benchmarking Using Multi-Criteria Decision-Making Techniques , 2017, J. Circuits Syst. Comput..

[148]  Ming-Yang Su,et al.  Permission-based malware detection mechanisms for smart phones , 2014, The International Conference on Information Networking 2014 (ICOIN2014).

[149]  Karen Scarfone,et al.  A standard for developing secure mobile applications , 2014, Comput. Stand. Interfaces.

[150]  Xun Li,et al.  Effective detection of android malware based on the usage of data flow APIs and machine learning , 2016, Inf. Softw. Technol..

[151]  Jie Qiu,et al.  A case study on key technologies of Android Trojans , 2014, 2014 11th International Computer Conference on Wavelet Actiev Media Technology and Information Processing(ICCWAMTIP).

[152]  Jugal K. Kalita,et al.  A survey of detection methods for XSS attacks , 2018, J. Netw. Comput. Appl..

[153]  Tai-Myung Chung,et al.  Vulnerability of the Smartphone Applications to Connect with Compromised Access Point , 2013, 2013 International Conference on Information Science and Applications (ICISA).

[154]  Alessandro Armando,et al.  Security considerations related to the use of mobile devices in the operation of critical infrastructures , 2014, Int. J. Crit. Infrastructure Prot..

[155]  Mordechai Guri,et al.  Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[156]  Nor Badrul Anuar,et al.  The rise of "malware": Bibliometric analysis of malware study , 2016, J. Netw. Comput. Appl..

[157]  Juan E. Tapiador,et al.  Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps , 2014, Inscrypt.

[158]  Xiangyu Zhang,et al.  Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques , 2012, ESSoS.

[159]  Abdul Halim Zaim,et al.  Implementation of a web-based service for mobile application risk assessment , 2017, Turkish J. Electr. Eng. Comput. Sci..

[160]  Wen Liu,et al.  Mutiple classifier system based android malware detection , 2013, 2013 International Conference on Machine Learning and Cybernetics.

[161]  Jacques Klein,et al.  FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.

[162]  Jean-Pierre Seifert,et al.  pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.

[163]  Hao Huang,et al.  Detect Android Malware Variants Using Component Based Topology Graph , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[164]  Yarub A. Wahsheh,et al.  Secure QR code system , 2014, 2014 10th International Conference on Innovations in Information Technology (IIT).

[165]  Siddhi Pittayachawan,et al.  Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach , 2015, Comput. Secur..

[166]  David Whalley,et al.  Program differentiation , 2010, INTERACT-14.

[167]  Yanan Cao,et al.  Research of Intrusion Detection System on Android , 2013, 2013 IEEE Ninth World Congress on Services.

[168]  Ching-Hsien Hsu,et al.  A framework of cloud-based virtual phones for secure intelligent information management , 2014, Int. J. Inf. Manag..

[169]  Rida Khatoun,et al.  Diagnosing smartphone's abnormal behavior through robust outlier detection methods , 2013, Global Information Infrastructure Symposium - GIIS 2013.

[170]  B. B. Zaidan,et al.  Real-Time Fault-Tolerant mHealth System: Comprehensive Review of Healthcare Services, Opens Issues, Challenges and Methodological Aspects , 2018, Journal of Medical Systems.

[171]  Steven Salerno,et al.  Exploration of Attacks on Current Generation Smartphones , 2011, ANT/MobiWIS.

[172]  Markus Zeilinger,et al.  ANANAS - A Framework for Analyzing Android Applications , 2013, 2013 International Conference on Availability, Reliability and Security.

[173]  Sancheng Peng,et al.  Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[174]  Julian Schütte,et al.  A Configurable and Extensible Security Service Architecture for Smartphones , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[175]  A. A. Zaidan,et al.  An evaluation and selection problems of OSS-LMS packages , 2016, SpringerPlus.

[176]  Normaziah Abdul Aziz,et al.  Techniques for analysing Android malware , 2014, The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M).

[177]  Nor Badrul Anuar,et al.  Mobile botnet detection: Proof of concept , 2014, 2014 IEEE 5th Control and System Graduate Research Colloquium.

[178]  Ali El Attar,et al.  Robust clustering methods for detecting smartphone's abnormal behavior , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[179]  Xingquan Zhu,et al.  Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.

[180]  Andrew Hunt,et al.  Automated identification of installed malicious Android applications , 2013, Digit. Investig..

[181]  Shivakant Mishra,et al.  On rootkit and malware detection in smartphones , 2010, 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W).

[182]  Matthias Lange,et al.  Taming Mr Hayes: Mitigating signaling based attacks on smartphones , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).

[183]  Won Ryu,et al.  Detecting malware with similarity to Android applications , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).

[184]  M. Ghallali,et al.  Security of mobile phones: Prevention methods for the spread of malware , 2012, 2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT).

[185]  Hang Dong,et al.  Malware detection method of android application based on simplification instructions , 2014 .

[186]  Yubo Song,et al.  A Mobile Communication Honeypot Observing System , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[187]  Yan Bai,et al.  2TAC: Distributed Access Control Architecture for "Bring Your Own Device" Security , 2012, 2012 ASE/IEEE International Conference on BioMedical Computing (BioMedCom).

[188]  Tilo Müller,et al.  A game of Droid and Mouse: The threat of split-personality malware on Android , 2015, Comput. Secur..

[189]  A. A. Zaidan,et al.  A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent taxonomy, open issues and recommendation pathway solution , 2018, Health and Technology.

[190]  B. B. Zaidan,et al.  Towards on Develop a Framework for the Evaluation and Benchmarking of Skin Detectors Based on Artificial Intelligent Models Using Multi-Criteria Decision-Making Techniques , 2017, Int. J. Pattern Recognit. Artif. Intell..

[191]  Hyung-Woo Lee,et al.  Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities , 2012, Proceedings of 2012 2nd International Conference on Computer Science and Network Technology.

[192]  Lynn Batten,et al.  Smartphone Applications, Malware and Data Theft , 2016 .

[193]  Wei Yu,et al.  On behavior-based detection of malware on Android platform , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[194]  A. A. Zaidan,et al.  A methodology for football players selection problem based on multi-measurements criteria analysis , 2017 .

[195]  Yan Zhu,et al.  Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware , 2015, IEEE Transactions on Information Forensics and Security.

[196]  Ali Al Shidhani,et al.  Smartphone security awareness: Time to act , 2013, 2013 International Conference on Current Trends in Information Technology (CTIT).

[197]  Harris Papadopoulos,et al.  Android malware detection with unbiased confidence guarantees , 2018, Neurocomputing.

[198]  Nitesh Saxena,et al.  Curbing mobile malware based on user-transparent hand movements , 2015, 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[199]  Muhammad Mubashir Khan,et al.  Signature-based detection of privilege-escalation attacks on Android , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).

[200]  Ming Fan,et al.  DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis , 2017, IEEE Transactions on Information Forensics and Security.

[201]  Heloise Pieterse,et al.  Android botnets on the rise: Trends and characteristics , 2012, 2012 Information Security for South Africa.

[202]  Dimitrios Tzovaras,et al.  NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem , 2013, ISCIS.

[203]  John C. S. Lui,et al.  DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[204]  Manish Kumar,et al.  Cloud based intrusion detection architecture for smartphones , 2015, 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).

[205]  Stefan Kraxberger,et al.  Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) , 2016, Secur. Commun. Networks.

[206]  Wu Bin,et al.  Smartphone malware detection model based on artificial immune system , 2014, China Communications.

[207]  Hui He,et al.  Demadroid: Object Reference Graph-Based Malware Detection in Android , 2018, Secur. Commun. Networks.

[208]  Junho Choi,et al.  Personal information leakage detection method using the inference-based access control model on the Android platform , 2015, Pervasive Mob. Comput..

[209]  Sakir Sezer,et al.  A New Android Malware Detection Approach Using Bayesian Classification , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[210]  Aziz Mohaisen,et al.  Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information , 2015, Digit. Investig..

[211]  Ping Wang,et al.  Malware behavioural detection and vaccine development by using a support vector model classifier , 2015, J. Comput. Syst. Sci..

[212]  Mehmet A. Orgun,et al.  Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices , 2016, Comput. Hum. Behav..

[213]  Alireza Keshavarz-Haddad,et al.  A distributed patching scheme for controlling mobile malware infection , 2015, 2015 23rd Iranian Conference on Electrical Engineering.

[214]  David García,et al.  Infrastructure for Detecting Android Malware , 2013, ISCIS.

[215]  Alessandro Armando,et al.  Breaking and fixing the Android Launching Flow , 2013, Comput. Secur..

[216]  Jalal Al-Muhtadi,et al.  Survey on Mobile User's Data Privacy Threats and Defense Mechanisms , 2015, FNC/MobiSPC.

[217]  A. A. Zaidan,et al.  Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review, open issues & challenges, and recommended solutions , 2018 .

[218]  Edgar R. Weippl,et al.  QR Code Security -- How Secure and Usable Apps Can Protect Users Against Malicious QR Codes , 2015, 2015 10th International Conference on Availability, Reliability and Security.

[219]  Xi Wang,et al.  Secure session on mobile: An exploration on combining biometric, trustzone, and user behavior , 2014, 6th International Conference on Mobile Computing, Applications and Services.

[220]  Gang Li,et al.  Malware Detection in Smartphone Using Hidden Markov Model , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.

[221]  Jie Huang,et al.  Feedback-based smartphone strategic sampling for BYOD security , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[222]  Maurizio Aiello,et al.  Are mobile botnets a possible threat? The case of SlowBot Net , 2016, Comput. Secur..

[223]  M. Chuah,et al.  Smartphone Dual Defense Protection Framework: Detecting Malicious Applications in Android Markets , 2012, 2012 8th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[224]  Aduwati Sali,et al.  Multi-complex attributes analysis for optimum GPS baseband receiver tracking channels selection , 2017, 2017 4th International Conference on Control, Decision and Information Technologies (CoDIT).

[225]  Daniele Sgandurra,et al.  A collaborative framework for generating probabilistic contracts , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[226]  Han Bing Analysis and Research of System Security Based on Android , 2012, 2012 Fifth International Conference on Intelligent Computation Technology and Automation.

[227]  Thomas Steckler,et al.  Editorial: preclinical data reproducibility for R&D - the challenge for neuroscience , 2015, SpringerPlus.

[228]  Kim-Kwang Raymond Choo,et al.  Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users , 2014, Behav. Inf. Technol..

[229]  Xiaojiang Du,et al.  An effective online scheme for detecting Android malware , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).

[230]  Vijay Laxmi,et al.  AndroTaint: An efficient android malware detection framework using dynamic taint analysis , 2017, 2017 ISEA Asia Security and Privacy (ISEASP).

[231]  Kyu-Tae Lee,et al.  A security architecture for BYOD office , 2014, 2014 International Conference on Advanced Technologies for Communications (ATC 2014).

[232]  Brij B. Gupta,et al.  Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel , 2016 .

[233]  Lior Rokach,et al.  Mobile malware detection through analysis of deviations in application network behavior , 2014, Comput. Secur..

[234]  Shu-Chiung Lin,et al.  Simple and effective method for detecting abnormal internet behaviors of mobile devices , 2015, Inf. Sci..

[235]  Cristina Nita-Rotaru,et al.  Taming epidemic outbreaks in mobile adhoc networks , 2015, Ad Hoc Networks.

[236]  Mike Ter Louw,et al.  Automated Execution Control and Dynamic Behavior Monitoring for Android (TM) Applications , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.

[237]  Rida Khatoun,et al.  Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis , 2014, 2014 12th IEEE International Conference on Embedded and Ubiquitous Computing.

[238]  Thomas Zefferer,et al.  Policy-based security assessment of mobile end-user devices an alternative to mobile device management solutions for Android smartphones , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[239]  Albert B. Jeng,et al.  Android Malware Detection via a Latent Network Behavior Analysis , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[240]  Madhumita Chatterjee,et al.  A Novel Approach to Detect Android Malware , 2015 .

[241]  Shahaboddin Shamshirband,et al.  Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues , 2015, KSII Trans. Internet Inf. Syst..

[242]  Mohammed S. Alam,et al.  Random Forest Classification for Detecting Android Malware , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[243]  Tao Qi,et al.  An Android dynamic data protection model based on light virtualization , 2013, 2013 15th IEEE International Conference on Communication Technology.

[244]  Ying Zou,et al.  Detecting Android Malware Using Clone Detection , 2015, Journal of Computer Science and Technology.

[245]  Igor Nai Fovino,et al.  In-memory credentials robbery on android phones , 2013, World Congress on Internet Security (WorldCIS-2013).

[246]  Mohammed S. Alam,et al.  An Intelligent Multi-Agent Based Detection Framework for Classification of Android Malware , 2014, AMT.

[247]  Min Wu,et al.  Propagation model of smartphone worms based on semi-Markov process and social relationship graph , 2014, Comput. Secur..

[248]  Wang Tao,et al.  Design of Mobile Phone Security System Based on Detection of Abnormal Behavior , 2011, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[249]  Xiaolei Wang,et al.  Accurate mobile malware detection and classification in the cloud , 2015, SpringerPlus.

[250]  A. A. Zaidan,et al.  A new digital watermarking evaluation and benchmarking methodology using an external group of evaluators and multi‐criteria analysis based on ‘large‐scale data’ , 2017, Softw. Pract. Exp..

[251]  Suku Nair,et al.  Smartphone applications security: Survey of new vectors and solutions , 2013, 2013 ACS International Conference on Computer Systems and Applications (AICCSA).

[252]  Amir Herzberg,et al.  Securing Smartphones: A µTCB Approach , 2014, IEEE Pervasive Computing.

[253]  Ahmed Raza Rajput,et al.  A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks , 2020, ArXiv.

[254]  M. Kuehnhausen,et al.  Trusting smartphone Apps? To install or not to install, that is the question , 2013, 2013 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA).

[255]  Ronaldo M. Salles,et al.  Botnets: A survey , 2013, Comput. Networks.

[256]  Sancheng Peng,et al.  Modeling Malware Propagation in Smartphone Social Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[257]  Ali Feizollah,et al.  The Evolution of Android Malware and Android Analysis Techniques , 2017, ACM Comput. Surv..

[258]  Hyotaek Lim,et al.  An Analysis of Security System for Intrusion in Smartphone Environment , 2014, TheScientificWorldJournal.

[259]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[260]  Rozilawati Razali,et al.  Reviews on Cybercrime Affecting Portable Devices , 2013 .

[261]  Ainuddin Wahid Abdul Wahab,et al.  A review on feature selection in mobile malware detection , 2015, Digit. Investig..

[262]  Gaurav Somani,et al.  Anti-Hijack , 2016 .

[263]  Ethiopia Nigussie,et al.  CoDRA: Context-based dynamically reconfigurable access control system for android , 2018, J. Netw. Comput. Appl..

[264]  Chetna Gupta,et al.  Comparison of Static and Dynamic Analyzer Tools for iOS Applications , 2017, Wirel. Pers. Commun..

[265]  Jules White,et al.  Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[266]  Rida Khatoun,et al.  A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).