{"title":"分析Android恶意软件的技术","authors":"O. S. Adebayo, N. A. Aziz","doi":"10.1109/ICT4M.2014.7020656","DOIUrl":null,"url":null,"abstract":"The Android operating system is gaining market share on smartphones and tablets due to its market openness and easier accessibility and operability. Therefore, it is increasingly targeted by malware. This research examines several attack vectors on an android smartphone. Techniques are presented for the analysis of such attack vectors in order to identify and obtain useful features for analysis and classification and suggestions proffered for appropriate solution. The research recommends appropriate practices to ensure the security of information on an android smartphone.","PeriodicalId":327033,"journal":{"name":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Techniques for analysing Android malware\",\"authors\":\"O. S. Adebayo, N. A. Aziz\",\"doi\":\"10.1109/ICT4M.2014.7020656\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Android operating system is gaining market share on smartphones and tablets due to its market openness and easier accessibility and operability. Therefore, it is increasingly targeted by malware. This research examines several attack vectors on an android smartphone. Techniques are presented for the analysis of such attack vectors in order to identify and obtain useful features for analysis and classification and suggestions proffered for appropriate solution. The research recommends appropriate practices to ensure the security of information on an android smartphone.\",\"PeriodicalId\":327033,\"journal\":{\"name\":\"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICT4M.2014.7020656\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 5th International Conference on Information and Communication Technology for The Muslim World (ICT4M)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICT4M.2014.7020656","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Android operating system is gaining market share on smartphones and tablets due to its market openness and easier accessibility and operability. Therefore, it is increasingly targeted by malware. This research examines several attack vectors on an android smartphone. Techniques are presented for the analysis of such attack vectors in order to identify and obtain useful features for analysis and classification and suggestions proffered for appropriate solution. The research recommends appropriate practices to ensure the security of information on an android smartphone.