{"title":"移动恶意软件分析、检测技术和工具综述","authors":"Nana Kwarne Gyamfi, E. Owusu","doi":"10.1109/IEMCON.2018.8614895","DOIUrl":null,"url":null,"abstract":"The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better.","PeriodicalId":368939,"journal":{"name":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Survey of Mobile Malware Analysis, Detection Techniques and Tool\",\"authors\":\"Nana Kwarne Gyamfi, E. Owusu\",\"doi\":\"10.1109/IEMCON.2018.8614895\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better.\",\"PeriodicalId\":368939,\"journal\":{\"name\":\"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)\",\"volume\":\"147 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMCON.2018.8614895\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMCON.2018.8614895","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Survey of Mobile Malware Analysis, Detection Techniques and Tool
The rapid increase in the use of smartphones, has contributed to the increase in mobile attackers. In most situations deceitful applications are infected with malicious contents to cause harm to both the hardware and the software. These malicious programs or malware are usually designed to disrupt or gather information from the device. By attempts to curtail these problems various techniques are proposed. This paper attempts to analyze the most popular and recent techniques and suggests which is better.