StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Android Malware Detection and Prevention Techniques - Literature review Example

Cite this document
Summary
This literature review "Android Malware Detection and Prevention Techniques" provides a thorough review of current approaches for analysis of Android security. It offers the basic taxonomy to be used for categorizing research approaches and assessment mechanisms of Android security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful

Extract of sample "Android Malware Detection and Prevention Techniques"

Download file to see previous pages

Android, having more than one million apps has emerged as the leading mobile platform (Cozza et al. 2014). The markets for mobile apps, for instance, Android Google Play, have fundamentally transformed the manner in which consumers receive software, with daily updating and inclusion of many apps. The rapid expansions of the apps market coupled with the pervasive nature of apps provided on such platforms have paralleled the rise in the sophistication and number of security threats targeting mobile platforms.

Studies undertaken in the last few years indicate that mobile markets have vulnerable or malicious apps, thus compromising millions of gadgets. This case is common in Android markets, where several app cases afflicted with spyware and malware have been cited (Shabtai et al. 2010). Many culprits are responsible and some of them are not technical, for instance, the absence of a regulatory body in open markets along with the inconsequential implications to people providing apps with malicious potential or vulnerabilities.

The scenario is likely to increase because mobile applications are becoming ubiquitous and complex since mobile computing is in the infancy stages.Within the context, the security of Android has emerged as an interesting research topic in recent years, following its launch in 2008. Such research attempts have examined the security threats of Android from different viewpoints and are spread across different research communities, thus resulting in a literature body that cuts across different publication venues and domains.

A significant quantity of the reviewed literature is published within the software security and engineering domains. However, literature pertaining to the security of Android also runs parallel with those for analyzing programming language and mobile computing. Yet an extensive study, which links the knowledge and offers a thorough overview of existing state-of-the-art.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Android Malware Detection and Prevention Techniques Literature review Example | Topics and Well Written Essays - 7000 words, n.d.)
Android Malware Detection and Prevention Techniques Literature review Example | Topics and Well Written Essays - 7000 words. https://studentshare.org/information-technology/2092639-android-malware-detection-and-prevention-techniques
(Android Malware Detection and Prevention Techniques Literature Review Example | Topics and Well Written Essays - 7000 Words)
Android Malware Detection and Prevention Techniques Literature Review Example | Topics and Well Written Essays - 7000 Words. https://studentshare.org/information-technology/2092639-android-malware-detection-and-prevention-techniques.
“Android Malware Detection and Prevention Techniques Literature Review Example | Topics and Well Written Essays - 7000 Words”. https://studentshare.org/information-technology/2092639-android-malware-detection-and-prevention-techniques.
  • Cited: 0 times

CHECK THESE SAMPLES OF Android Malware Detection and Prevention Techniques

An Assessment of the Vulnerabilities of the iPhone

“The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks.... ulnerability is a characteristic or feature of a constituent that can be broken by an outside or inside agent like a hacking agent or a malware attack to break a safety policy or cause a harmful consequence on the software of the iphone....
20 Pages (5000 words) Dissertation

Cyber/digital Attacks

This is a malware that is built to illegally obtain, track and block the right of a user to get access to the system.... This paper  ''Cyber/digital Attacks'' tells that Cyber-attacks are a deliberate or unintentional unauthorized task, which cannot be avoided or is in avoidable that that is capable of causing a vagary on the cyberspace resources....
12 Pages (3000 words) Literature review

Data Privacy and Security

This is a malware that is built to illegally obtain, track, and block the right of a user to get access to the system.... The research paper 'Data Privacy and Security' demonstrates that cybercrime is any felony that is committed using a computer or any other computer-related device for example the internet....
12 Pages (3000 words) Research Paper

Four Fundamental Cyber Security Components

This is a malware that is built to illegally obtain, track and block the right of a user to get access to the system.... Cyber security is said to be a big issue for business costing not only lost revenue but damaged reputations and lost custom.... Your task is to investigate the need for cyber security and analyze the threats from which it protects business....
13 Pages (3250 words) Essay

Security in Bluetooth and Other Mobile Devices

Firstly, in order to suspect and find out rare and unintentional activities that happens in the bank end through the means of "risk-based authentication and anomaly detection".... The reason why these mobile phones are not reliable because android phones can be easily hacked and iPhone was hacked before it even released raising a doubt about their security in the minds of all....
3 Pages (750 words) Assignment

Malware Analysis Plan

This paper ''Malware Analysis Plan'' looks into the possible methods, techniques, skills, and knowledge through which the malware are handled and computing experiences are made safe.... In order to overcome the challenge and threat of malware various techniques, tools, programs, applications, security based measures and other knowledge based techniques are used that enable overcoming the challenges of malware.... nbsp; This paper looks into the possible methods, techniques, skills, and knowledge through which the malware are handled and computing experiences are made safe....
10 Pages (2500 words) Research Paper

A Study on Threat Awareness and Use of Countermeasures among Online Users

The research paper " A Study on Threat Awareness and Use of Countermeasures among Online Users" describes the problem and consequences of the use of the internet, This paper outlines the background of threat awareness, types of threat, the severity of threats and main countermeasures.... nbsp;… The internet has permeated the lives of modern men in more respects than can be tabulated simply....
39 Pages (9750 words) Research Paper

Android Malware Detection Using Machine Learning or Other Techniques

This research paper "android malware detection Using Machine Learning or Other Techniques" focuses on one of the main challenges in technology today that is security.... nbsp;… android malware has been growing in scale and complexity, making the traditional methods of scanning and stopping malware irrelevant in the anti-malware war.... 5% in 2010, showing an increase in android malware with the increase in its popularity.... The period between the months of April and June 2013 saw an increase in android malware by 200%....
14 Pages (3500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us