Understanding the root of attack in android malware
With the rapid pace of development and change in mobile device technology and Android versions, Android malware has emerged and become a focus in current research. Subsequently, security and privacy have become one of the main issues in android malware. Therefore, it is essential to understand the b...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTHM
2018
|
Subjects: | |
Online Access: | http://eprints.uthm.edu.my/3673/1/AJ%202018%20%28715%29%20Understanding%20the%20root%20of%20attack%20in%20android%20malware.pdf |
_version_ | 1796868881211457536 |
---|---|
author | Romli, Rahiwan Nazar Zolkipli, Mohamad Fadli Al-Ma’arif, Ahmad Ramli, Muhamad Ramiza Salamat, Mohamad Aizi |
author_facet | Romli, Rahiwan Nazar Zolkipli, Mohamad Fadli Al-Ma’arif, Ahmad Ramli, Muhamad Ramiza Salamat, Mohamad Aizi |
author_sort | Romli, Rahiwan Nazar |
collection | UTHM |
description | With the rapid pace of development and change in mobile device technology and Android versions, Android malware has emerged and become a focus in current research. Subsequently, security and privacy have become one of the main issues in android malware. Therefore, it is essential to understand the behavior of Android malware in order to conceive an effective technique in malware detection and analysis. This article presents a comprehensive study regarding Android platform, its features in android malware code and also discusses the result from previous studies in order to support forward-looking in Android study. |
first_indexed | 2024-03-05T21:46:28Z |
format | Article |
id | uthm.eprints-3673 |
institution | Universiti Tun Hussein Onn Malaysia |
language | English |
last_indexed | 2024-03-05T21:46:28Z |
publishDate | 2018 |
publisher | Penerbit UTHM |
record_format | dspace |
spelling | uthm.eprints-36732021-11-21T06:56:57Z http://eprints.uthm.edu.my/3673/ Understanding the root of attack in android malware Romli, Rahiwan Nazar Zolkipli, Mohamad Fadli Al-Ma’arif, Ahmad Ramli, Muhamad Ramiza Salamat, Mohamad Aizi TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television With the rapid pace of development and change in mobile device technology and Android versions, Android malware has emerged and become a focus in current research. Subsequently, security and privacy have become one of the main issues in android malware. Therefore, it is essential to understand the behavior of Android malware in order to conceive an effective technique in malware detection and analysis. This article presents a comprehensive study regarding Android platform, its features in android malware code and also discusses the result from previous studies in order to support forward-looking in Android study. Penerbit UTHM 2018 Article PeerReviewed text en http://eprints.uthm.edu.my/3673/1/AJ%202018%20%28715%29%20Understanding%20the%20root%20of%20attack%20in%20android%20malware.pdf Romli, Rahiwan Nazar and Zolkipli, Mohamad Fadli and Al-Ma’arif, Ahmad and Ramli, Muhamad Ramiza and Salamat, Mohamad Aizi (2018) Understanding the root of attack in android malware. The International Journal of Integrated Engineering, 10 (6). pp. 203-208. ISSN 2229-838X |
spellingShingle | TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television Romli, Rahiwan Nazar Zolkipli, Mohamad Fadli Al-Ma’arif, Ahmad Ramli, Muhamad Ramiza Salamat, Mohamad Aizi Understanding the root of attack in android malware |
title | Understanding the root of attack in android malware |
title_full | Understanding the root of attack in android malware |
title_fullStr | Understanding the root of attack in android malware |
title_full_unstemmed | Understanding the root of attack in android malware |
title_short | Understanding the root of attack in android malware |
title_sort | understanding the root of attack in android malware |
topic | TK5101-6720 Telecommunication. Including telegraphy, telephone, radio, radar, television |
url | http://eprints.uthm.edu.my/3673/1/AJ%202018%20%28715%29%20Understanding%20the%20root%20of%20attack%20in%20android%20malware.pdf |
work_keys_str_mv | AT romlirahiwannazar understandingtherootofattackinandroidmalware AT zolkiplimohamadfadli understandingtherootofattackinandroidmalware AT almaarifahmad understandingtherootofattackinandroidmalware AT ramlimuhamadramiza understandingtherootofattackinandroidmalware AT salamatmohamadaizi understandingtherootofattackinandroidmalware |