Professional Documents
Culture Documents
I. INTRODUCTION
With the rapid development in mobile computing
technology, smartphones and tablets have evolved to offer
sophisticated functionalities at lower costs. The Android
platform has been in the forefront of this mobile revolution and
has gained enormous popularity over the last four years. But
the popularity has also brought the attention of major malware
developers towards the platform. The fact that Android offers
an open market model unlike the closed app Store model of
Apple, where each application (app) is manually inspected by
security experts, makes it a more favourable target for
malicious developers. The existence of many third-party app
stores also contributes to the spreading of malicious apps for
Android platform.
We have performed an extensive literature survey where
we analysed current state-of-the-art on android malwares and
countermeasures. The motivation for this research is to identify
the current state of malware research in Android smart devices,
classify existing malware techniques and their countermeasures
and through that process come up with novel suggestions for
tackling recent malwares. The main contributions of this paper
are twofold: (i) survey and classification of existing techniques
and (ii) proposal of novel development techniques and
countermeasures.
There are various potential attack scenarios where an
attacker can take advantage of the vulnerabilities of the
Android platform to compromise a user. A possible scenario
would be where a Trojan app performs some innocent task in
the foreground, say download HD wallpapers, while it secretly
leaks confidential private data such as contacts from users
mobile phone. In the case of the wallpapers app, it will have
INTERNET permission for downloading the wallpapers. An
https://blog.lookout.com/blog/2011/02/15/security-alert-hongtoutounew-android-trojan-found-in-china/
http://wala.sourceforge.net/
http://www.reuters.com/article/2010/07/30/us-hackers-androididUSTRE66T52O20100730
[17]
[18]
[19]
ACKNOWLEDGMENT
The work is a part of the Android Security project launched
by Mentorship Program of Lab-X Foundation, Inc., a nonprofit organization in Boston, USA.
[20]
[21]
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]