Understanding the root of attack in android malware

With the rapid pace of development and change in mobile device technology and Android versions, Android malware has emerged and become a focus in current research. Subsequently, security and privacy have become one of the main issues in android malware. Therefore, it is essential to understand the b...

Full description

Bibliographic Details
Main Authors: Romli, Rahiwan Nazar, Zolkipli, Mohamad Fadli, Al-Ma’arif, Ahmad, Ramli, Muhamad Ramiza, Salamat, Mohamad Aizi
Format: Article
Language:English
Published: Penerbit UTHM 2018
Subjects:
Online Access:http://eprints.uthm.edu.my/3673/1/AJ%202018%20%28715%29%20Understanding%20the%20root%20of%20attack%20in%20android%20malware.pdf
_version_ 1796868881211457536
author Romli, Rahiwan Nazar
Zolkipli, Mohamad Fadli
Al-Ma’arif, Ahmad
Ramli, Muhamad Ramiza
Salamat, Mohamad Aizi
author_facet Romli, Rahiwan Nazar
Zolkipli, Mohamad Fadli
Al-Ma’arif, Ahmad
Ramli, Muhamad Ramiza
Salamat, Mohamad Aizi
author_sort Romli, Rahiwan Nazar
collection UTHM
description With the rapid pace of development and change in mobile device technology and Android versions, Android malware has emerged and become a focus in current research. Subsequently, security and privacy have become one of the main issues in android malware. Therefore, it is essential to understand the behavior of Android malware in order to conceive an effective technique in malware detection and analysis. This article presents a comprehensive study regarding Android platform, its features in android malware code and also discusses the result from previous studies in order to support forward-looking in Android study.
first_indexed 2024-03-05T21:46:28Z
format Article
id uthm.eprints-3673
institution Universiti Tun Hussein Onn Malaysia
language English
last_indexed 2024-03-05T21:46:28Z
publishDate 2018
publisher Penerbit UTHM
record_format dspace
spelling uthm.eprints-36732021-11-21T06:56:57Z http://eprints.uthm.edu.my/3673/ Understanding the root of attack in android malware Romli, Rahiwan Nazar Zolkipli, Mohamad Fadli Al-Ma’arif, Ahmad Ramli, Muhamad Ramiza Salamat, Mohamad Aizi TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television With the rapid pace of development and change in mobile device technology and Android versions, Android malware has emerged and become a focus in current research. Subsequently, security and privacy have become one of the main issues in android malware. Therefore, it is essential to understand the behavior of Android malware in order to conceive an effective technique in malware detection and analysis. This article presents a comprehensive study regarding Android platform, its features in android malware code and also discusses the result from previous studies in order to support forward-looking in Android study. Penerbit UTHM 2018 Article PeerReviewed text en http://eprints.uthm.edu.my/3673/1/AJ%202018%20%28715%29%20Understanding%20the%20root%20of%20attack%20in%20android%20malware.pdf Romli, Rahiwan Nazar and Zolkipli, Mohamad Fadli and Al-Ma’arif, Ahmad and Ramli, Muhamad Ramiza and Salamat, Mohamad Aizi (2018) Understanding the root of attack in android malware. The International Journal of Integrated Engineering, 10 (6). pp. 203-208. ISSN 2229-838X
spellingShingle TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television
Romli, Rahiwan Nazar
Zolkipli, Mohamad Fadli
Al-Ma’arif, Ahmad
Ramli, Muhamad Ramiza
Salamat, Mohamad Aizi
Understanding the root of attack in android malware
title Understanding the root of attack in android malware
title_full Understanding the root of attack in android malware
title_fullStr Understanding the root of attack in android malware
title_full_unstemmed Understanding the root of attack in android malware
title_short Understanding the root of attack in android malware
title_sort understanding the root of attack in android malware
topic TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television
url http://eprints.uthm.edu.my/3673/1/AJ%202018%20%28715%29%20Understanding%20the%20root%20of%20attack%20in%20android%20malware.pdf
work_keys_str_mv AT romlirahiwannazar understandingtherootofattackinandroidmalware
AT zolkiplimohamadfadli understandingtherootofattackinandroidmalware
AT almaarifahmad understandingtherootofattackinandroidmalware
AT ramlimuhamadramiza understandingtherootofattackinandroidmalware
AT salamatmohamadaizi understandingtherootofattackinandroidmalware