Aiman Ahmed Abu Samra, Hasan Qunoo, Fatma Al-Rubaie, Haneen El-Talli
{"title":"静态Android恶意软件检测技术综述","authors":"Aiman Ahmed Abu Samra, Hasan Qunoo, Fatma Al-Rubaie, Haneen El-Talli","doi":"10.1109/PICECE.2019.8747224","DOIUrl":null,"url":null,"abstract":"Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.","PeriodicalId":375980,"journal":{"name":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"A survey of Static Android Malware Detection Techniques\",\"authors\":\"Aiman Ahmed Abu Samra, Hasan Qunoo, Fatma Al-Rubaie, Haneen El-Talli\",\"doi\":\"10.1109/PICECE.2019.8747224\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.\",\"PeriodicalId\":375980,\"journal\":{\"name\":\"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PICECE.2019.8747224\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 7th Palestinian International Conference on Electrical and Computer Engineering (PICECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICECE.2019.8747224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A survey of Static Android Malware Detection Techniques
Nowadays android is the most popular operating system. Android apps suffer from more and more malware attacks. So more and more research is done to get a reliable malware detection approaches. Android malware detection is mainly divided into dynamic approach and static approach. In this paper, we present a survey of the two major approaches of the static Android malware detection: the permission based Detection technique and the signature based detection technique. It is a comparative study, that should be helpful for researchers in this topic. Based on clear parameters the study illustrates the similarity and differences in addition to the accuracy in important published researches.