Mobile malware attacks: Review, taxonomy & future directions

Attia Qamar, Ahmad Karim, Victor Chang

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

A pervasive increase in the adoption rate of smartphones with Android OS is noted in recent years. Android's popular and attractive environment not only captured the attention of users but also increased security concerns. As a result, Android malware detection is one of the sizzling topics in the mobile security domain. This paper provides a comprehensive review of state-of-the-art mobile malware attacks, vulnerabilities, detection techniques and security solutions over the period of 2013–2019 that majorly targeted Android platform. We have presented various well-organized and in-depth taxonomies that uncover mobile malware detection approaches based on their analysis techniques, working platform, data acquisition, operational impact, obtained results and artificial intelligence component involved. Another taxonomy comprises of mobile malware attack vector is presented to look threat clusters and loopholes to locate their malicious widespread impact on communities. Furthermore, we have discussed and classified forensic analysis efforts in mobile malware detection perspective. From the intruder point of view, we have compared various evasion techniques that are used prominently by the malware authors to hinder detection efforts. Finally, future work directions are presented as guidelines for academia and industry alike to help them reduce or even avoid the harmful impact of these annoying efforts.

Original languageEnglish
Pages (from-to)887-909
Number of pages23
JournalFuture Generation Computer Systems
Volume97
DOIs
Publication statusPublished - 1 Aug 2019

Fingerprint

Taxonomies
Smartphones
Artificial intelligence
Malware
Data acquisition
Industry

Cite this

@article{fb0739418ea647df8877010e8a2a7ccd,
title = "Mobile malware attacks: Review, taxonomy & future directions",
abstract = "A pervasive increase in the adoption rate of smartphones with Android OS is noted in recent years. Android's popular and attractive environment not only captured the attention of users but also increased security concerns. As a result, Android malware detection is one of the sizzling topics in the mobile security domain. This paper provides a comprehensive review of state-of-the-art mobile malware attacks, vulnerabilities, detection techniques and security solutions over the period of 2013–2019 that majorly targeted Android platform. We have presented various well-organized and in-depth taxonomies that uncover mobile malware detection approaches based on their analysis techniques, working platform, data acquisition, operational impact, obtained results and artificial intelligence component involved. Another taxonomy comprises of mobile malware attack vector is presented to look threat clusters and loopholes to locate their malicious widespread impact on communities. Furthermore, we have discussed and classified forensic analysis efforts in mobile malware detection perspective. From the intruder point of view, we have compared various evasion techniques that are used prominently by the malware authors to hinder detection efforts. Finally, future work directions are presented as guidelines for academia and industry alike to help them reduce or even avoid the harmful impact of these annoying efforts.",
author = "Attia Qamar and Ahmad Karim and Victor Chang",
year = "2019",
month = "8",
day = "1",
doi = "10.1016/j.future.2019.03.007",
language = "English",
volume = "97",
pages = "887--909",
journal = "Future Generation Computer Systems",
issn = "0167-739X",
publisher = "Elsevier",

}

Mobile malware attacks : Review, taxonomy & future directions. / Qamar, Attia; Karim, Ahmad; Chang, Victor.

In: Future Generation Computer Systems, Vol. 97, 01.08.2019, p. 887-909.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Mobile malware attacks

T2 - Review, taxonomy & future directions

AU - Qamar, Attia

AU - Karim, Ahmad

AU - Chang, Victor

PY - 2019/8/1

Y1 - 2019/8/1

N2 - A pervasive increase in the adoption rate of smartphones with Android OS is noted in recent years. Android's popular and attractive environment not only captured the attention of users but also increased security concerns. As a result, Android malware detection is one of the sizzling topics in the mobile security domain. This paper provides a comprehensive review of state-of-the-art mobile malware attacks, vulnerabilities, detection techniques and security solutions over the period of 2013–2019 that majorly targeted Android platform. We have presented various well-organized and in-depth taxonomies that uncover mobile malware detection approaches based on their analysis techniques, working platform, data acquisition, operational impact, obtained results and artificial intelligence component involved. Another taxonomy comprises of mobile malware attack vector is presented to look threat clusters and loopholes to locate their malicious widespread impact on communities. Furthermore, we have discussed and classified forensic analysis efforts in mobile malware detection perspective. From the intruder point of view, we have compared various evasion techniques that are used prominently by the malware authors to hinder detection efforts. Finally, future work directions are presented as guidelines for academia and industry alike to help them reduce or even avoid the harmful impact of these annoying efforts.

AB - A pervasive increase in the adoption rate of smartphones with Android OS is noted in recent years. Android's popular and attractive environment not only captured the attention of users but also increased security concerns. As a result, Android malware detection is one of the sizzling topics in the mobile security domain. This paper provides a comprehensive review of state-of-the-art mobile malware attacks, vulnerabilities, detection techniques and security solutions over the period of 2013–2019 that majorly targeted Android platform. We have presented various well-organized and in-depth taxonomies that uncover mobile malware detection approaches based on their analysis techniques, working platform, data acquisition, operational impact, obtained results and artificial intelligence component involved. Another taxonomy comprises of mobile malware attack vector is presented to look threat clusters and loopholes to locate their malicious widespread impact on communities. Furthermore, we have discussed and classified forensic analysis efforts in mobile malware detection perspective. From the intruder point of view, we have compared various evasion techniques that are used prominently by the malware authors to hinder detection efforts. Finally, future work directions are presented as guidelines for academia and industry alike to help them reduce or even avoid the harmful impact of these annoying efforts.

UR - http://www.scopus.com/inward/record.url?scp=85063999403&partnerID=8YFLogxK

U2 - 10.1016/j.future.2019.03.007

DO - 10.1016/j.future.2019.03.007

M3 - Article

AN - SCOPUS:85063999403

VL - 97

SP - 887

EP - 909

JO - Future Generation Computer Systems

JF - Future Generation Computer Systems

SN - 0167-739X

ER -