Malware detection techniques for mobile devices

01/09/2018
by   Bela Amro, et al.
0

Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most needs of their users. Both software and hardware design focused on increasing performance and the working hours of a mobile device. Different mobile operating systems are being used today with different platforms and different market shares. Like all information systems, mobile systems are prone to malware attacks. Due to the personality feature of mobile devices, malware detection is very important and is a must tool in each device to protect private data and mitigate attacks. In this paper, analysis of different malware detection techniques used for mobile operating systems is provides. The focus of the analysis will be on the to two competing mobile operating systems - Android and iOS. Finally, an assessment of each technique and a summary of its advantages and disadvantages is provided. The aim of the work is to establish a basis for developing a mobile malware detection tool based on user profiling.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/13/2018

Phishing Techniques in Mobile Devices

The rapid evolution in mobile devices and communication technology has i...
research
02/12/2018

Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences

Mobile malware has increased rapidly last 10 years. This rapid increase ...
research
08/31/2023

MONDEO: Multistage Botnet Detection

Mobile devices have widespread to become the most used piece of technolo...
research
12/13/2021

Software Micro-Rejuvenation for Android Mobile Systems

Software aging – the phenomenon affecting many long-running systems, cau...
research
11/07/2012

Different Operating Systems Compatible for Image Prepress Process in Color Management: Analysis and Performance Testing

Image computing has become a real catchphrase over the past few years an...
research
09/09/2022

A Worldwide Look Into Mobile Access Networks Through the Eyes of AmiGos

Mobile phones are nowadays the predominant way for users to access the I...
research
08/07/2023

Eye-Shield: Real-Time Protection of Mobile Device Screen Information from Shoulder Surfing

People use mobile devices ubiquitously for computing, communication, sto...

Please sign up or login with your details

Forgot password? Click here to reset