{"title":"Techniques for analysing Android malware","authors":"O. S. Adebayo, N. A. Aziz","doi":"10.1109/ICT4M.2014.7020656","DOIUrl":null,"url":null,"abstract":"The Android operating system is gaining market share on smartphones and tablets due to its market openness and easier accessibility and operability. Therefore, it is increasingly targeted by malware. This research examines several attack vectors on an android smartphone. Techniques are presented for the analysis of such attack vectors in order to identify and obtain useful features for analysis and classification and suggestions proffered for appropriate solution. The research recommends appropriate practices to ensure the security of information on an android smartphone.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICT4M.2014.7020656","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The Android operating system is gaining market share on smartphones and tablets due to its market openness and easier accessibility and operability. Therefore, it is increasingly targeted by malware. This research examines several attack vectors on an android smartphone. Techniques are presented for the analysis of such attack vectors in order to identify and obtain useful features for analysis and classification and suggestions proffered for appropriate solution. The research recommends appropriate practices to ensure the security of information on an android smartphone.