Techniques for Analysis of Mobile Malware

Techniques for Analysis of Mobile Malware

Gopinath Palaniappan, Balaji Rajendran, S. Sangeetha, NeelaNarayanan V
ISBN13: 9781522582410|ISBN10: 152258241X|ISBN13 Softcover: 9781522583202|EISBN13: 9781522582427
DOI: 10.4018/978-1-5225-8241-0.ch010
Cite Chapter Cite Chapter

MLA

Palaniappan, Gopinath, et al. "Techniques for Analysis of Mobile Malware." Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems, edited by S. Geetha and Asnath Victy Phamila, IGI Global, 2019, pp. 193-210. https://doi.org/10.4018/978-1-5225-8241-0.ch010

APA

Palaniappan, G., Rajendran, B., Sangeetha, S., & NeelaNarayanan V. (2019). Techniques for Analysis of Mobile Malware. In S. Geetha & A. Phamila (Eds.), Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems (pp. 193-210). IGI Global. https://doi.org/10.4018/978-1-5225-8241-0.ch010

Chicago

Palaniappan, Gopinath, et al. "Techniques for Analysis of Mobile Malware." In Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems, edited by S. Geetha and Asnath Victy Phamila, 193-210. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8241-0.ch010

Export Reference

Mendeley
Favorite

Abstract

The rapid rise in the number of mobile devices has resulted in an alarming increase in mobile software and applications. The mobile application markets/stores too have created a fundamental shift in the way mobile applications are delivered to users, with apps being added and updated in thousands every day. Even though research progresses have been achieved towards detection and mitigation of mobile security, open challenges still remain and also keep evolving in this area. Several studies reveal that mobile application markets/stores do harbor applications that are either vulnerable or malicious in nature, leading to compromises of millions of devices. This chapter (1) captures the attack surface of mobile devices, (2) lists the various mobile malware analysis techniques, and (3) lays the ground for research on mobile malware by providing mobile malware dataset resources, tools for malware analysis, patent landscaping for mobile malware detection, and a few open challenges in malware analysis.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.