UPSI Digital Repository (UDRep)
Start | FAQ | About
Menu Icon

QR Code Link :

Type :article
Subject :T Technology (General)
Main Author :Albahrey, Shihab Ahmed
Additional Authors :Al-Juboori, A. Z. Ansaef
Zaidan, Bilal Bahaa
Mohammed Talal
Alsalem, Mohammed Assim
Albahri, A.s.
Alamoodi, A. H.
Miss Laiha Mat Kiah
Fawaz Jumaah
Musaab Alaa
Title :Comprehensive review and analysis of anti-malware apps for smartphones
Place of Production :Tanjong Malim
Publisher :Fakulti Seni, Komputeran dan Industri Kreatif
Year of Publication :2019
Corporate Name :Universiti Pendidikan Sultan Idris

Abstract : Universiti Pendidikan Sultan Idris
The new and disruptive technologies for ensuring smartphone security are very limited and largely scattered. The available options and gaps in this research area must be analysed to provide valuable insights about the present technological environment. This work illustrates the research landscape by mapping the existing literature to a comprehensive taxonomy with four categories. The frst category includes review and survey articles related to smartphone security. The second category includes papers on smartphone security solutions. The third category includes smartphone malware studies that examine the security aspects of smartphones and the threats posed by malware. The fourth category includes ranking, clustering and classifcation studies that classify malware based on their families or security risk levels. Several smartphone security apps have also been analysed and compared based on their mechanisms to identify their contents and distinguishing features by using several evaluation metrics and parameters. Two malware detection techniques, namely, machine-learning-based and non-machine-learning-based malware detection, are drawn from the review. The basic characteristics of this emerging feld of research are discussed in the following aspects: (1) motivation behind the development of security measures for diferent smartphone operating system (Oss), (2) open challenges that compromise the usability and personal information of users and (3) recommendations for enhancing smartphone security. This work also reviews the functionalities and services of several anti-malware companies to fully reveal their security mechanisms, features and strategies. This work also highlights the open challenges and issues related to the evaluation and benchmarking of malware detection techniques to identify the best malware detection apps for smartphones  

References

1. Wu, S., Wang, P., Li, X., & Zhang, Y. (2016). Efective detection of android malware based on the usage of data fow APIs and machine learning. Information and Software Technology, 75, 17–25.

2. Sharma, K., & Gupta, B. (2016). Multi-layer defense against malware attacks on smartphone Wi-Fi access channel. Procedia Computer Science, 78, 19–25.

3. Farina, P., Cambiaso, E., Papaleo, G., & Aiello, M. (2016). Are mobile botnets a possible threat? The case of SlowBot Net. Computers & Security, 58, 268–283.

4. Do, Q., Martini, B., & Choo, K.-K. R. (2015). Exfltrating data from Android devices. Computers & Security, 48, 74–91.

5. Delac, G., Silic, M., & Krolo, J. (2011). Emerging security threats for mobile platforms. In MIPRO, 2011 proceedings of the 34th international convention, 2011 (pp. 1468–1473).

6. Mikhaylov, D., Zhukov, I., Starikovskiy, A., Kharkov, S., Tolstaya, A., & Zuykov, A. (2013). Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices. In 2013 5th IEEE international conference on broadband network & multimedia technology (IC-BNMT) (pp.302–305).

7. Khan, J., Abbas, H., & Al-Muhtadi, J. (2015). Survey on mobile user’s data privacy threats and defense mechanisms. Procedia Computer Science, 56, 376–383.

8. Eslahi, M., Rostami, M. R., Hashim, H., Tahir, N., & Naseri, M. V. (2014). A data collection approach for Mobile Botnet analysis and detection. In 2014 IEEE symposium on wireless technology and applications (ISWTA) (pp. 199–204).

9. Amamra, A., Talhi, C., & Robert, J. M. (2012). Smartphone malware detection: From a survey towards taxonomy. In 2012 7th international conference on malicious and unwanted software (MALWARE) (pp. 79–86).

10. Arshad, S., Shah, M. A., Khan, A., & Ahmed, M. (2016). Android malware detection and protection: A survey. International Journal of Advanced Computer Science and Applications, 7, 463–475.

11. Tam, K., Feizollah, A., Anuar, N. B., Salleh, R., & Cavallaro, L. (2017). The evolution of android malware and android analysis techniques. ACM Computing Surveys (CSUR), 49(4), 76.

12. Feizollah, A., Anuar, N. B., Salleh, R., & Wahab, A. W. A. (2015). A review on feature selection in mobile malware detection. Digital Investigation, 13, 22–37.

13. Peng, S., Yu, S., & Yang, A. (2014). Smartphone malware and its propagation modeling: A survey. IEEE Communications Surveys & Tutorials, 16, 925–941.

14. Delosières, L., & García, D. (2013). Infrastructure for detecting Android malware. In E. Gelenbe & R. Lent (Eds.), Information sciences and systems 2013, Lecture Notes in Electrical Engineering, (vol. 264). Cham: Springer.

15. Karim, A., Shah, S. A. A., Salleh, R. B., Arif, M., Noor, R. M., & Shamshirband, S. (2015). Mobile botnet attacks-an emerging threat: Classification, review and open issues. TIIS, 9, 1471–1492.

16. Meshram, P. D., & Thool, R. C. (2014). A survey paper on vulnerabilities in android OS and security of android devices. In 2014 IEEE global conference on wireless computing and networking (GCWCN) (pp. 174–178).

17. Hsieh, W. C., Wu, C. C., & Kao, Y. W. (2015). A study of android malware detection technology evolution. In 2015 international Carnahan conference on security technology (ICCST) (pp. 135–140).

18. Baykara, M., & Çolak, E. (2018). A review of cloned mobile malware applications for android devices. In 2018 6th international symposium on digital forensic and security (ISDFS) (pp. 1–5).

19. Turkanovi?, M., & Polan?i?, G. (2013). On the security of certain e-communication types: Risks, user awareness and recommendations. Journal of Information Security and Applications, 18, 193–205.

20. Fang, Z., Han, W., & Li, Y. (2014). Permission based Android security: Issues and countermeasures. Computers & Security, 43, 205–218.

21. Silva, S. S. C., Silva, R. M. P., Pinto, R. C. G., & Salles, R. M. (2013). Botnets: A survey. Computer Networks, 57, 378–403.

22. Eshmawi, A., & Nair, S. (2013). Smartphone applications security: Survey of new vectors and solutions. In 2013 ACS international conference on computer systems and applications (AICCSA) (pp. 1–4).

23. Zachariah, R., Akash, K., Yousef, M. S., & Chacko, A. M. (2017). Android malware detection a survey. In 2017 IEEE international conference on circuits and systems (ICCS) (pp. 238–244).

24. Kalpana, S., & Karthikeyan, S. (2017). A survey on rise of mobile malware and detection methods. In 2017 international conference on innovations in information, embedded and communication systems (ICIIECS) (pp. 1–5).

25. Ahvanooey, M. T., Li, Q., Rabbani, M., & Rajput, A. R. (2017). A survey on smartphones security: Software vulnerabilities, malware, and attacks. International Journal of Advanced Computer Science and Applications, 8, 30–45.

26. Sarmah, U., Bhattacharyya, D. K., & Kalita, J. K. (2018). A survey of detection methods for XSS attacks. Journal of Network and Computer Applications, 118, 113–143.

27. Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38–54.

28. Ab Razak, M. F., Anuar, N. B., Salleh, R., & Firdaus, A. (2016). The rise of “malware”: Bibliometric analysis of malware study. Journal of Network and Computer Applications, 75, 58–76.

29. Safavi, S., Shukur, Z., & Razali, R. (2013). Reviews on cybercrime affecting portable devices. Procedia Technology, 11, 650–657.

30. Song, Y., Zhu, X., Hong, Y., Zhang, H., & Tan, H. (2012). A mobile communication honeypot observing system. In 2012 fourth international conference on multimedia information networking and security (pp. 861–865)

31. Shankar, V. G., & Somani, G. (2016). Anti-Hijack: Runtime detection of malware initiated hijacking in android. Procedia Computer Science, 78, 587–594.

32. Choi, J., Sung, W., Choi, C., & Kim, P. (2015). Personal information leakage detection method using the inference-based access control model on the Android platform. Pervasive and MobileComputing, 24, 138–149.

33. Kumar Thanigaivelan, N., Nigussie, E., Hakkala, A., Virtanen, S., & Isoaho, J. (2018). CoDRA: Context-based dynamically reconfgurable access control system for android. Journal of Network and Computer Applications, 101, 1–17.

34. Zeferer, T., & Teuf, P. (2013). Policy-based security assessment of mobile end-user devices an alternative to mobile device management solutions for Android smartphones. In 2013 international conference on security and cryptography (SECRYPT) (pp. 1–8).

35. Armando, A., Merlo, A., & Verderame, L. (2014). Security considerations related to the use of mobile devices in the operation of critical infrastructures. International Journal of Critical Infrastructure Protection, 7, 247–256.

36. Lee, S. M., Suh, S. B., & Choi, J. D. (2010). Fine-grained I/O access control based on xen virtualization for 3G/4G mobiledevices. In Design automation conference (DAC), 2010 47th ACM/IEEE (pp. 108–113).

37. Mulliner, C., Liebergeld, S., Lange, M., & Seifert, J. P. (2012). Taming Mr Hayes: Mitigating signaling based attacks on smartphones. In IEEE/IFIP international conference on dependable systems and networks (DSN 2012) (pp. 1–12).

38. Zhang, X., Seifert, J. P., & Aciicmez, O. (2014). Design and implementation of efcient integrity protection for open mobile platforms. IEEE Transactions on Mobile Computing, 13, 188–201.

39. Zhang, X., Seifert, J.-P., & Ac?içmez, O. (2010). SEIP: Simple and efcient integrity protection for open mobile platforms. In International conference on information and communications security (pp. 107–125).

40. Chang, D., Hines, S., West, P., Tyson, G., & Whalley, D. (2012). Program diferentiation. Journal of Circuits, Systems, and Computers, 21, 1240007.

41. Kodeswaran, P., Nandakumar, V., Kapoor, S., Kamaraju, P., Joshi, A., & Mukherjea, S. (2012). Securing enterprise data on smartphones using run time information fow control. In 2012 IEEE 13th international conference on mobile data management (pp. 300–305).

42. Saudi, M. M., & Husainiamer, M. A. B. (2017). Mobile malware classifcation via system calls and permission for GPS exploitation. International Journal of Advanced Computer Science and Applications, 8, 277–283.

43. Dai Fei, G., Ai-Fen, S., & Tao, G. (2012). A behavior analysis based mobile malware defense system. In 2012 6th international conference on signal processing and communication systems (ICSPCS) (pp. 1–6).

44. Adas, H., Shetty, S., & Tayib, W. (2015). Scalable detection of web malware on smartphones. In 2015 international conference on information and communication technology research (ICTRC) (pp. 198–201).

45. Park, W., Lee, K. H., Kim, S., & Ryu, W. (2015). A fnancial fraud protection platform on Android smartphones in real-time. In 2015 international conference on information and communication technology convergence (ICTC) (pp. 1246–1248).

46. Derhab, A., Saleem, K., Al-Muhtadi, J., & Orgun, M. A. (2016). Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices. Computers in Human Behavior, 59, 9–17.

47. Qingqing, S., Tao, Q., Tan, Y., & Yidong, C. (2013). An Android dynamic data protection model based on light virtualization. In 2013 15th IEEE international conference on communication technology (ICCT) (pp. 65–69).

48. Kothari, S., Deepak, A., Tamrawi, A., Holland, B., & Krishnan, S. (2014). A “Human-in-the-loop”; approach for resolving complex software anomalies. In 2014 IEEE international conference on systems, man, and cybernetics (SMC) (pp. 1971–1978).

49. Liang, S., Might, M., & Van Horn, D. (2015). AnaDroid: Malware analysis of android with user-supplied predicates. Electronic Notes in Theoretical Computer Science, 311, 3–14.

50. Shrestha, B., Ma, D., Zhu, Y., Li, H., & Saxena, N. (2015). Tap-wave-rub: Lightweight human interaction approach to curb emerging smartphone malware. IEEE Transactions on Information Forensics and Security, 10, 2270–2283.

51. Shrestha, B., Mohamed, M., Borg, A., Saxena, N., & Tamrakar, S. (2015). Curbing mobile malware based on user-transparent hand movements. In 2015 IEEE international conference on pervasive computing and communications (PerCom) (pp. 221–229).

52. Dongwoo, K., Chankyu, P., & Jaecheol, R. (2015). StopBankun: Countermeasure of app replacement attack on Android. In 2015 seventh international conference on ubiquitous and future networks (pp. 603–605).

53. Hung, S.-H., Hsiao, S.-W., Teng, Y.-C., & Chien, R. (2015). Real-time and intelligent private data protection for the Android platform. Pervasive and Mobile Computing, 24, 231–242.

54. Fitzgerald, W. M., Neville, U., & Foley, S. N. (2013). MASON: Mobile autonomic security for network access controls. Journal of Information Security and Applications, 18, 14–29.

55. Liang, S., Du, X., Tan, C. C., & Yu, W. (2014). An efective online scheme for detecting Android malware. In 2014 23rd international conference on computer communication and networks (ICCCN) (pp. 1–8).

56. Soh, C., Tan, H. B. K., Arnatovich, Y. L., & Wang, L. (2015). Detecting clones in android applications through analyzing user interfaces. In 2015 IEEE 23rd international conference on program comprehension (pp. 163–173).

57. Potharaju, R., Newell, A., Nita-Rotaru, C., & Zhang, X. (2012). Plagiarizing smartphone applications: attack strategies and defense techniques. In International symposium on engineering secure software and systems (pp. 106–120).

58. M. A. Dar (). A novel approach to restrict the access of malicious applications in android. In 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), 2017 (pp. 1–4).

59. Chen, J., Alalf, M. H., Dean, T. R., & Zou, Y. (2015). Detecting android malware using clone detection. Journal of Computer Science and Technology, 30, 942–956.

60. Chen, Y. L., Lee, H. M., Jeng, A. B., & Wei, T. E. (2015). DroidCIA: A novel detection method of code injection attacks on HTML5-based mobile apps. In Trustcom/BigDataSE/ISPA, 2015 IEEE (pp. 1014–1021).

61. Chen, K., Zhang, Y., & Liu, P. (2018). Leveraging information asymmetry to transform android apps into self-defending code against repackaging attacks. IEEE Transactions on Mobile Computing, 17, 1879–1893.

62. Niazi, R. H., Shamsi, J. A., Waseem, T., & Khan, M. M. (2015). Signature-based detection of privilege-escalation attacks on Android. In 2015 conference on information assurance and cyber security (CIACS) (pp. 44–49).

63. Geneiatakis, D., Fovino, I. N., Kounelis, I., & Stirparo, P. (2015). A Permission verifcation approach for android mobile applications. Computers & Security, 49, 192–205.

64. Zhongyuan, Q., Xinshuai, Z., Qunfang, Z., & Zhongyun, Y. (2014). An efcient method of detecting repackaged android applications. In International conference on cyberspace technology (CCT 2014) (pp. 1–4).

65. Louk, M., Lim, H., & Lee, H. (2014). An analysis of security system for intrusion in smartphone environment. The Scientifc World Journal. https://doi.org/10.1155/2014/983901.

66. Suarez-Tangil, G., Tapiador, J. E., & Peris-Lopez, P. (2014). Stegomalware: Playing hide and seek with malicious components in smartphone apps. In International conference on information security and cryptology (pp. 496–515).

67. Wei, T. E., Mao, C. H., Jeng, A. B., Lee, H. M., Wang, H. T., & Wu, D. J. (2012). Android malware detection via a latent network behavior analysis. In 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (pp. 1251–1258).

68. Chen, P. S., Lin, S.-C., & Sun, C.-H. (2015). Simple and efective method for detecting abnormal internet behaviors of mobile devices. Information Sciences, 321, 193–204.

69. Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., & Elovici, Y. (2014). Mobile malware detection through analysis of deviations in application network behavior. Computers & Security, 43, 1–18.

70. Shabtai, A., Kanonov, U., & Elovici, Y. (2010). Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. Journal of Systems and Software, 83, 1524–1537.

71. El Attar, A., Khatoun, R., & Lemercier, M. (2014). Clusteringbased anomaly detection for smartphone applications. In 2014 IEEE network operations and management symposium (NOMS) (pp. 1–4).

72. Isohara, T., Takemori, K., & Kubota, A. (2011). Kernel-based behavior analysis for android malware detection. In 2011 seventh international conference on computational intelligence and security (CIS) (pp. 1011–1015).

73. Xin, K., Li, G., Qin, Z., & Zhang, Q. (2012). Malware detection in smartphone using hidden Markov model. In 2012 fourth international conference on multimedia information networking and security (pp. 857–860).

74. Ham, Y. J., Choi, W. B., Lee, H. W., Lim, J. & Kim, J. N. (2012). Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities. In 2012 2nd international conference on computer science and network technology (ICCSNT) (pp. 371–375).

75. Yuan, F., Zhai, L., Cao, Y., & Guo, L. (2013). Research of intrusion detection system on android. In 2013 IEEE ninth world congress on services (pp. 312–316).

76. Alam, M. S., & Vuong, S. T. (2013). Random forest classifcation for detecting android malware. In Green computing and communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE international conference on and IEEE cyber, physical and social computing (pp. 663–669).

77. Louw, M. T., Krull, M., Thomas, T., Cathey, R., Frazier, G., & Weber, M. (2013). Automated execution control and dynamic behavior monitoring for android (TM) applications. In MILCOM 2013—2013 IEEE military communications conference (pp. 968–973).

78. Wei, Y., Hanlin, Z., Linqiang, G., & Hardy, R. (2013). On behavior-based detection of malware on Android platform. In 2013

IEEE global communications conference (GLOBECOM) (pp.

814–819).

79. Attar, A. E., Khatoun, R., & Lemercier, M. (2014). A Gaussian

mixture model for dynamic detection of abnormal behavior in

smartphone applications. In 2014 global information infrastructure and networking symposium (GIIS) (pp. 1–6).

80. Attar, A. E., Khatoun, R., Birregah, B., & Lemercier, M. (2014).

Robust clustering methods for detecting smartphone’s abnormal

behavior. In 2014 IEEE wireless communications and networking

conference (WCNC) (pp. 2552–2557).

 

81. Saad, M. H., Serageldin, A., & Salama, G. I. (2015). Android

spyware disease and medication. In 2015 second international

conference on information security and cyber forensics (InfoSec)

(pp. 118–125).

82. Wang, C., Li, Z., Mo, X., Yang, H., & Zhao, Y. (2017). An

android malware dynamic detection method based on service

call co-occurrence matrices. Annals of Telecommunications, 72,

607–615.

83. Dai, S., Liu, Y., Wang, T., Wei, T., & Zou, W. (2010). Behaviorbased malware detection on mobile phone. In 2010 6th international conference on wireless communications networking and

mobile computing (WiCOM) (pp. 1–4).

84. Ham, H.-S., Kim, H.-H., Kim, M.-S., & Choi, M.-J. (2014).

Linear SVM-based android malware detection for reliable

IoT services. Journal of Applied Mathematics. https://doi.

org/10.1155/2014/594501.

85. Liu, Y., Jia, S., & Xing, C. (2012). A novel behavior-based virus

detection method for smart mobile terminals. Discrete Dynamics

in Nature and Society. https://doi.org/10.1155/2012/262193.

86. Suarez-Tangil, G., Conti, M., Tapiador, J. E., & Peris-Lopez,

P. (2014). Detecting targeted smartphone malware with behavior-triggering stochastic models. In European symposium on

research in computer security (pp. 183–201).

87. Kurniawan, H., Rosmansyah, Y., & Dabarsyah, B. (2015).

Android anomaly detection system using machine learning classifcation. In 2015 international conference on electrical engineering and informatics (ICEEI) (pp. 288–293).

88. Lee, S., Lee, J., & Lee, H. (2013). Screening smartphone applications using behavioral signatures. In IFIP international information security conference (pp. 14–27).

89. Damopoulos, D., Kambourakis, G., Gritzalis, S., & Park, S. O.

(2014). Exposing mobile malware from the inside (or what is

your mobile app really doing?). Peer-to-Peer Networking and

Applications, 7, 687–697.

90. Lu, Y., Zulie, P., Jingju, L., & Yi, S. (2013). Android malware

detection technology based on improved Bayesian classifcation.

In 2013 third international conference on instrumentation, measurement, computer, communication and control (IMCCC) (pp.

1338–1341).

91. Ming-Yang, S., & Wen-Chuan, C. (2014). Permission-based malware detection mechanisms for smart phones. In The international conference on information networking 2014 (ICOIN2014)

(pp. 449–452).

92. Yerima, S. Y., Sezer, S., McWilliams, G., & Muttik, I. (2013). A

new android malware detection approach using bayesian classifcation. In 2013 IEEE 27th international conference on advanced

information networking and applications (AINA) (pp. 121–128).

93. Faruki, P., Laxmi, V., Ganmoor, V., Gaur, M. S., & Bharmal, A.

(2013). DroidOLytics: Robust feature signature for repackaged

android apps on ofcial and third party android markets. In 2013

2nd international conference on advanced computing, networking and security (pp. 247–252).

94. Peiravian, N., & Zhu, X. (2013). Machine learning for android

malware detection using permission and API calls. In 2013 IEEE

25th international conference on tools with artifcial intelligence

(pp. 300–305).

95. Wen, L. (2013). Mutiple classifer system based android malware

detection. In 2013 international conference on machine learning

and cybernetics (pp. 57–62).

96. Yüksel, A. S., Yüksel, M. E., Sertba?, A., & Zaim, A. H. (2017).

Implementation of a web-based service for mobile application

risk assessment. Turkish Journal of Electrical Engineering and

Computer Science, 25, 976–994.

97. Fazeen, M., & Dantu, R. (2014). Another free app: Does it have

the right intentions?. In 2014 twelfth annual international conference on privacy, security and trust (PST) (pp. 282–289).

 

98. Zheng, M., Sun, M., & Lui, J. C. S. (2014). DroidTrace: A ptrace

based Android dynamic analysis system with forward execution

capability. In 2014 international wireless communications and

mobile computing conference (IWCMC) (pp. 128–133).

99. Teuf, P., Zeferer, T., Woergoetter, C., Oprisnik, A., & Hein, D.

(2014). Android: On-device detection of SMS catchers and snifers. In 2014 international conference on privacy and security in

mobile systems (PRISMS) (pp. 1–8).

100. Shen, T., Zhongyang, Y., Xin, Z., Mao, B., & Huang, H. (2014).

Detect android malware variants using component based topology graph. In 2014 IEEE 13th international conference on trust,

security and privacy in computing and communications (pp.

406–413).

101. Dhaya, R., & Poongodi, M. (2014). Detecting software vulnerabilities in android using static analysis. In 2014 international

conference on advanced communication control and computing

technologies (ICACCCT) (pp. 915–918).

102. Abraham, A., Andriatsimandeftra, R., Brunelat, A., Lalande, J.

F., & Tong, V. V. T. (2015). GroddDroid: A gorilla for triggering

malicious behaviors. In 2015 10th international conference on

malicious and unwanted software (MALWARE) (pp. 119–127).

103. Yerima, S. Y., Sezer, S., & Muttik, I. (2015). High accuracy

android malware detection using ensemble learning. IET Information Security, 9, 313–320.

104. Liang, S., & Du, X. (2014). Permission-combination-based

scheme for android mobile malware detection. In 2014 IEEE

international conference on communications (ICC) (pp.

2301–2306).

105. Elish, K. O., Shu, X., Yao, D., Ryder, B. G., & Jiang, X. (2015).

Profling user-trigger dependence for Android malware detection.

Computers & Security, 49, 255–273.

106. Feizollah, A., Anuar, N. B., Salleh, R., Suarez-Tangil, G., &

Furnell, S. (2017). Androdialysis: Analysis of android intent

efectiveness in malware detection. Computers & Security, 65,

121–134.

107. Talha, K. A., Alper, D. I., & Aydin, C. (2015). APK Auditor:

Permission-based Android malware detection system. Digital

Investigation, 13, 1–14.

108. Sheen, S., Anitha, R., & Natarajan, V. (2015). Android based

malware detection using a multifeature collaborative decision

fusion approach. Neurocomputing, 151(Part 2), 905–912.

109. Hang, D., He, N., Ge, H., Qi, L., & Zhang, M. (2014). Malware

detection method of android application based on simplifcation

instructions. The Journal of China Universities of Posts and Telecommunications, 21, 94–100.

110. Seo, S.-H., Gupta, A., Mohamed Sallam, A., Bertino, E., & Yim,

K. (2014). Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer

Applications, 38, 43–53.

111. Song, J., Han, C., Wang, K., Zhao, J., Ranjan, R., & Wang, L.

(2016). An integrated static detection and analysis framework for

android. Pervasive and Mobile Computing, 32, 15–25.

112. Kaur, P., & Sharma, S. (2015). Spyware detection in android

using hybridization of description analysis, permission mapping

and interface analysis. Procedia Computer Science, 46, 794–803.

113. Almin, S. B., & Chatterjee, M. (2015). A novel approach to detect

android malware. Procedia Computer Science, 45, 407–417.

114. Faruki, P., Laxmi, V., Bharmal, A., Gaur, M. S., & Ganmoor, V.

(2015). AndroSimilar: Robust signature for detecting variants of

Android malware. Journal of Information Security and Applications, 22, 66–80.

115. Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein,

J., et al. (2014). Flowdroid: Precise context, fow, feld, objectsensitive and lifecycle-aware taint analysis for android apps.

ACM SIGPLAN Notices, 49, 259–269.

 

116. Lee, J., Lee, S., & Lee, H. (2015). Screening smartphone applications using malware family signatures. Computers & Security,

52, 234–249.

117. Wang, X., Yang, Y., & Zeng, Y. (2015). Accurate mobile malware detection and classifcation in the cloud. SpringerPlus, 4,

1.

118. Eder, T., Rodler, M., Vymazal, D., & Zeilinger, M. (2013).

ANANAS: A framework for analyzing android applications. In

2013 eighth international conference on availability, reliability

and security (ARES) (pp. 711–719).

119. Lindorfer, M., Neugschwandtner, M., & Platzer, C. (2015).

MARVIN: Efcient and comprehensive mobile app classifcation

through static and dynamic analysis. In Computer software and

applications conference (COMPSAC), 2015 IEEE 39th annual

(pp. 422–433).

120. Wang, P., & Wang, Y.-S. (2015). Malware behavioural detection

and vaccine development by using a support vector model classifer. Journal of Computer and System Sciences, 81, 1012–1026.

121. Stirparo, P., Fovino, I. N., Taddeo, M., & Kounelis, I. (2013). Inmemory credentials robbery on android phones. In 2013 World

Congress on Internet Security (WorldCIS) (pp. 88–93).

122. Nguyen, L., Tian, Y., Cho, S., Kwak, W., Parab, S., Kim, Y., et al.

(2013). UnLocIn: Unauthorized location inference on smartphones without being caught. In 2013 International Conference

on Privacy and Security in Mobile Systems (PRISMS) (pp. 1–8).

123. Kotkar, C., & Game, P. (2015). Prevention mechanism for prohibiting SMS malware attack on android smartphone. In 2015

annual IEEE India conference (INDICON) (pp. 1–5).

124. Te-En, W., Jeng, A. B., Hahn-Ming, L., Chih-How, C., & ChinWei, T. (2012). Android privacy. In 2012 international conference on machine learning and cybernetics (pp. 1830–1837).

125. Shastry, A., Kantarcioglu, M., Zhou, Y., & Thuraisingham, B.

(2012). Randomizing smartphone malware profles against statistical mining techniques. In IFIP annual conference on data

and applications security and privacy (pp. 239–254).

126. Liu, Z. Y., Li, Y. C., Yang, H. C., & Qiu, J. (2014). A case study

on key technologies of Android Trojans. In 2014 11th international computer conference on wavelet active media technology

and information processing (ICCWAMTIP) (pp. 321–324).

127. Szongott, C., Henne, B., & Smith, M. (2012). Evaluating the

threat of epidemic mobile malware. In 2012 IEEE 8th international conference on wireless and mobile computing, networking

and communications (WiMob) (pp. 443–450).

128. Maier, D., Protsenko, M., & Müller, T. (2015). A game of Droid

and Mouse: The threat of split-personality malware on Android.

Computers & Security, 54, 2–15.

129. Fernandes, E., Crispo, B., & Conti, M. (2013). Fm 99.9, radio

virus: Exploiting fm radio broadcasts for malware deployment.

IEEE Transactions on Information Forensics and Security, 8,

1027–1037.

130. Chiang, H. S., & Tsaur, W. J. (2010). Mobile malware behavioral

analysis and preventive strategy using ontology. In 2010 IEEE

second international conference on social computing (SocialCom) (pp. 1080–1085).

131. Sobhani, A., & Keshavarz-Haddad, A. (2015). A distributed

patching scheme for controlling mobile malware infection. In

2015 23rd Iranian conference on electrical engineering (pp.

187–192).

132. Park, J.-K., & Choi, S.-Y. (2015). Studying security weaknesses

of android system. International Journal of Security and Its

Applications. Science and Engineering Research Support Center,

9, 7–12.

133. Titze, D., Stephanow, P., & Schütte, J. (2013). A confgurable and

extensible security service architecture for smartphones. In 2013

27th international conference on advanced information networking and applications workshops (WAINA) (pp. 1056–1062).

 

134. Kim, S., & Lee, K. T. (2014). A security architecture for BYOD

ofce. In 2014 international conference on advanced technologies for communications (ATC 2014) (pp. 487–490).

135. Chung, S., Chung, S., Escrig, T., Bai, Y., & Endicott-Popovsky,

B. (2012). 2TAC: Distributed access control architecture for

“bring your own device” security. In 2012 ASE/IEEE international conference on biomedical computing (BioMedCom) (pp.

123–126).

136. Cho, T., & Seo, S.-H. (2015). A strengthened android signature

management method. TIIS, 9, 1210–1230.

137. Gilad, Y., Herzberg, A., & Trachtenberg, A. (2014). Securing

smartphones: A µTCB approach. IEEE Pervasive Computing,

13, 72–79.

138. Paul, M., Chauhan, N. S., & Saxena, A. (2011). A security analysis of smartphone data fow and feasible solutions for lawful

interception. In 2011 7th international conference on information

assurance and security (IAS) (pp. 19–24).

139. Lee, C., Kim, J., Cho, S.-J., Choi, J., & Park, Y. (2014). Unifed

security enhancement framework for the Android operating system. The Journal of Supercomputing, 67, 738–756.

140. Bani-Hani, R. M., Wahsheh, Y. A., & Al-Sarhan, M. B. (2014).

Secure QR code system. In 2014 10th international conference

on innovations in information technology (INNOVATIONS) (pp.

1–6).

141. Feng, T., DeSalvo, N., Xu, L., Zhao, X., Wang, X., & Shi, W.

(2014). Secure session on mobile: An exploration on combining

biometric, trustzone, and user behavior. In 2014 6th international

conference on mobile computing, applications and services

(MobiCASE) (pp. 206–215).

142. Teuf, P., Zeferer, T., & Stromberger, C. (2013). Mobile device

encryption systems. In IFIP international information security

conference (pp. 203–216).

143. Baek, J., & Youm, H. Y. (2015). Secure and lightweight authentication protocol for NFC tag based services. In 2015 10th Asia

joint conference on information security (AsiaJCIS) (pp. 63–68).

144. Pournaghshband, V., Meyer, D., Holyland, M., Sarrafzadeh, M.,

& Reiher, P. (2014). Adrasteia: A smartphone app for securing

legacy mobile medical devices. In 2014 IEEE 17th international

conference on computational science and engineering (CSE) (pp.

758–763).

145. Guri, M., Kedma, G., Zadov, B., & Elovici, Y. (2014). Trusted

detection of sensitive activities on mobile phones using power

consumption measurements. In Intelligence and security informatics conference (JISIC), 2014 IEEE Joint (pp. 145–151).

146. Guido, M., Ondricek, J., Grover, J., Wilburn, D., Nguyen, T., &

Hunt, A. (2013). Automated identifcation of installed malicious

Android applications. Digital Investigation, 10(Supplement),

S96–S104.

147. Alam, M., & Vuong, S. T. (2014). An intelligent multi-agent

based detection framework for classifcation of android malware. In International conference on active media technology

(pp. 226–237).

148. Singh, S., Mishra, B., & Singh, S. (2015). Detecting intelligent malware on dynamic Android analysis environments. In

2015 10th international conference for internet technology and

secured transactions (ICITST) (pp. 414–419).

149. Qian, H., & Wen, Q. (2012). A cloud-based system for enhancing security of Android devices. In 2012 IEEE 2nd international

conference on cloud computing and intelligence systems (pp.

245–249).

150. Zonouz, S., Houmansadr, A., Berthier, R., Borisov, N., & Sanders, W. (2013). Secloud: A cloud-based comprehensive and lightweight security solution for smartphones. Computers & Security,

37, 215–227.

151. Ding, J.-H., Chien, R., Hung, S.-H., Lin, Y.-L., Kuo, C.-Y., Hsu,

C.-H., et al. (2014). A framework of cloud-based virtual phones

 

for secure intelligent information management. International

Journal of Information Management, 34, 329–335.

152. Dye, S. M., & Scarfone, K. (2014). A standard for developing

secure mobile applications. Computer Standards & Interfaces,

36, 524–530.

153. Zhu, K., Song, Y., & Chen, F. (2014). Implementation of automated testing system for android applications based on dynamic

taint propagation. In Communications security conference (CSC

2014) (pp. 1–5).

154. Lagerspetz, E., Truong, H. T. T., Tarkoma, S., & Asokan, N.

(2014). MDoctor: A mobile malware prognosis application. In

2014 IEEE 34th international conference on distributed computing systems workshops (ICDCSW) (pp. 201–206).

155. Wählisch, M., Trapp, S., Schiller, J., Jochheim, B., Nolte, T.,

Schmidt, T. C., et al. (2012). Vitamin C for your smartphone:

The SKIMS approach for cooperativeand lightweight security

at mobiles. ACM SIGCOMM Computer Communication Review,

42, 271–272.

156. Pieterse, H., & Olivier, M. S. (2013). Security steps for smartphone users. In 2013 Information Security for South Africa (pp.

1–6).

157. Hoque, E., Potharaju, R., Nita-Rotaru, C., Sarkar, S., & Venkatesh, S. S. (2015). Taming epidemic outbreaks in mobile adhoc

networks. Ad Hoc Networks, 24, 57–72.

158. Bhatt, A. J., & Gupta, C. (2017). Comparison of static and

dynamic analyzer tools for iOS applications. Wireless Personal

Communications, 96, 4013–4046.

159. Bernik, I., & Markelj, B. (2012). Blended threats to mobile

devices on the rise. In 2012 international conference on information society (i-Society) (pp. 59–64).

160. Pieterse, H., & Olivier, M. S. (2012). Android botnets on the

rise: Trends and characteristics. In 2012 information security for

South Africa (pp. 1–5).

161. Xueming, L. (2013). Access control research based on trusted

computing android smartphone. In 2013 third international conference on intelligent system design and engineering applications

(ISDEA) (pp. 213–215).

162. Pu, S., Chen, Z., Huang, C., Liu, Y., & Zen, B. (2014). Threat

analysis of smart mobile device. In General assembly and scientifc symposium (URSI GASS), 2014 XXXIth URSI (pp. 1–3).

163. Rastogi, S., Bhushan, K., & Gupta, B. (2016). Android applications repackaging detection techniques for smartphone devices.

Procedia Computer Science, 78, 26–32.

164. Batten, L., Moonsamy, V., & Alazab, M. (2015). Smartphone

applications, malware and data theft. In M. Senthilkumar, V.

Ramasamy, S. Sheen, C. Veeramani, A. Bonato, & L. Batten

(Eds.), Computational intelligence, cyber security and computational models (pp. 15–24). Berlin: Springer. https://doi.

org/10.1007/978-981-10-0251-9_2.

165. Mu, J., Cui, A., & Rao, J. (2013). Android mobile security–

threats and protection. In International conference on computer,

networks and communication engineering (ICCNCE 2013) (pp.

683–686).

166. Abdullah, Z., Saudi, M. M., & Anuar, N. B. (2014). Mobile botnet detection: Proof of concept. In 2014 IEEE 5th Control and

System Graduate Research Colloquium (ICSGRC) (pp. 257–262).

167. Kumar, M., & Hanumanthappa, M. (2015). Cloud based intrusion

detection architecture for smartphones. In 2015 international

conference on innovations in information, embedded and communication systems (ICIIECS) (pp. 1–6).

168. Yang, T., Yang, Y., Qian, K., Lo, D. C. T., Qian, Y., & Tao, L.

(2015). Automated detection and analysis for android ransomware. In 2015 IEEE 17th international conference on high performance computing and communications (HPCC), 2015 IEEE

7th international symposium on cyberspace safety and security

 

(CSS), 2015 IEEE 12th international conferen on embedded software and systems (ICESS) (pp. 1338–1343).

169. Ghallali, M., & Ouahidi, B. E. (2012). Security of mobile phones:

Prevention methods for the spread of malware. In 2012 6th international conference on sciences of electronics, technologies of

information and telecommunications (SETIT) (pp. 648–651).

170. Lee, S., & Ju, D. Y. (2013). Assessment of malicious applications

using permissions and enhanced user interfaces on Android. In

2013 IEEE international conference on intelligence and security

informatics (ISI) (pp. 270–270).

171. Dixon, B., & Mishra, S. (2010). On rootkit and malware detection

in smartphones. In 2010 international conference on dependable

systems and networks workshops (DSN-W) (pp. 162–163).

172. Chiang, H. S., & Tsaur, W. J. (2011). Identifying smartphone

malware using data mining technology. In 2011 proceedings of

20th international conference on computer communications and

networks (ICCCN) (pp. 1–6).

173. Bing, H. (2012). Analysis and research of system security based

on android. In 2012 fifth international conference on intelligent computation technology and automation (ICICTA) (pp.

581–584).

174. Lei, Z., Junmao, Z., Zhongguang, T., Yulong, L., & Tao, W.

(2011). Design of mobile phone security system based on detection of abnormal behavior. In 2011 frst international conference

on instrumentation, measurement, computer, communication and

control (pp. 479–482).

175. Woo-Sung, C., & Dea-Woo, P. (2012). Malicious code hiding

android APP’s distribution and hacking attacks and incident

analysis. In 2012 8th international conference on information

science and digital content technology (ICIDT) (pp. 686–689).

176. Seo, S. H., Lee, D. G., & Yim, K. (2012). Analysis on maliciousness for mobile applications. In 2012 sixth international conference on innovative mobile and internet services in ubiquitous

computing (IMIS) (pp. 126–129).

177. Chemerkin, Y. (2012). Vulnerability elimination by force of

new mobile OS Comparative research of security techniques

on BlackBerry OS (incl. PlayBook). In 2012 international conference for Internet technology and secured transactions (pp.

483–487).

178. Park, M. W., & Chung, T. M. (2013). Vulnerability of the smartphone applications to connect with compromised access point.

In 2013 international conference on information science and

applications (ICISA) (pp. 1–2).

179. Attar, A. E., Khatoun, R., & Lemercier, M. (2013). Diagnosing

smartphone’s abnormal behavior through robust outlier detection

methods. In Global information infrastructure symposium—GIIS

2013 (pp. 1–3).

180. Zaman, M., Siddiqui, T., Amin, M. R., & Hossain, M. S. (2015).

Malware detection in Android by network trafc analysis. In

2015 international conference on networking systems and security (NSysS) (pp. 1–5).

181. Park, W., Kim, S., & Ryu, W. (2015). Detecting malware with

similarity to Android applications. In 2015 international conference on information and communication technology convergence

(ICTC) (pp. 1249–1251).

182. Kim, M., Lee, T. J., Shin, Y., & Youm, H. Y. (2016). A study

on behavior-based mobile malware analysis system against evasion techniques. In 2016 international conference on information

networking (ICOIN), 2016 (pp. 455–457).

183. Singh, P., Tiwari, P., & Singh, S. (2016). Analysis of malicious

behavior of android apps. Procedia Computer Science, 79,

215–220.

184. Chen, P.-Y., Lin, H.-F., Hsu, K.-H., & Cheng, S.-M. (2014). Modeling dynamics of malware with incubation period from the view

of individual. In 2014 IEEE 79th vehicular technology conference (VTC Spring) (pp. 1–5).

 

185. Teufl, P., Ferk, M., Fitzek, A., Hein, D., Kraxberger, S., &

Orthacker, C. (2013). Malware detection by applying knowledge

discovery processes to application metadata on the Android Market (Google Play). Security and Communication Networks, 9(5),

389–419.

186. Peng, S., Wu, M., Wang, G., & Yu, S. (2014). Propagation model

of smartphone worms based on semi-Markov process and social

relationship graph. Computers & Security, 44, 92–103.

187. Martinelli, F., Saracino, A., Sgandurra, D., & Aldini, A. (2013).

A collaborative framework for generating probabilistic contracts.

In 2013 international conference on collaboration technologies

and systems (CTS) (pp. 139–142).

188. Peng, S., Wang, G., & Yu, S. (2013). Modeling malware propagation in smartphone social networks. In 2013 12th IEEE international conference on trust, security and privacy in computing

and communications (pp. 196–201).

189. Park, Y., Reeves, D. S., & Stamp, M. (2013). Deriving common

malware behavior through graph clustering. Computers & Security, 39, 419–430.

190. Peng, S., Wu, M., Wang, G., & Yu, S. (2014). Containing smartphone worm propagation with an infuence maximization algorithm. Computer Networks, 74, 103–113.

191. Li, F., Yang, Y., & Wu, J. (2010). CPMC: An efcient proximity

malware coping scheme in smartphone-based mobile networks.

Presented at the Proceedings of the 29th conference on information communications, San Diego, California, USA.

192. Xie, L., Zhang, X., Seifert, J.-P., & Zhu, S. (2010). pBMDS: A

behavior-based malware detection system for cellphone devices.

In Proceedings of the third ACM conference on wireless network

security (pp. 37–48).

193. Omar, M., & Dawson, M. (2013). Research in progress—Defending android smartphones from malware attacks. In 2013 third

international conference on advanced computing and communication technologies (ACCT) (pp. 288–292).

194. Al-Hadadi, M., & Shidhani, A. A. (2013). Smartphone security

awareness: Time to act. In 2013 international conference on current trends in information technology (CTIT) (pp. 166–171).

195. Dang-Pham, D., & Pittayachawan, S. (2015). Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach.

Computers & Security, 48, 281–297.

196. Markelj, B., & Bernik, I. (2015). Safe use of mobile devices

arises from knowing the threats. Journal of Information Security

and Applications, 20, 84–89.

197. Imgraben, J., Engelbrecht, A., & Choo, K.-K. R. (2014). Always

connected, but are smart mobile users getting more security

savvy? A survey of smart mobile device users. Behaviour &

Information Technology, 33, 1347–1360.

198. Panja, B., Fattaleh, D., Mercado, M., Robinson, A., & Meharia,

P. (2013). Cybersecurity in banking and fnancial sector: Security

analysis of a mobile banking application. In 2013 international

conference on collaboration technologies and systems (CTS) (pp.

397–403).

199. Adebayo, O. S. & Aziz, N. A. (2014). Techniques for analysing Android malware. In 2014 the 5th international conference

on information and communication technology for the Muslim

World (ICT4M) (pp. 1–6).

200. Salerno, S., Sanzgiri, A., & Upadhyaya, S. (2011). Exploration of

attacks on current generation smartphones. Procedia Computer

Science, 5, 546–553.

201. Zdziarski, J. (2014). Identifying back doors, attack points, and

surveillance mechanisms in iOS devices. Digital Investigation,

11, 3–19.

202. Maiorca, D., Ariu, D., Corona, I., Aresu, M., & Giacinto, G.

(2015). Stealth attacks: An extended insight into the obfuscation

efects on Android malware. Computers & Security, 51, 16–31

 

203. Yu, W., Zhang, H., & Xu, G. (2013). A study of malware detection on smart mobile devices. In SPIE defense, security, and

sensing, 2013 (pp. 87570H–87570H-8).

204. Mylonas, A., Dritsas, S., Tsoumas, B., & Gritzalis, D. (2011).

Smartphone security evaluation: The malware attack case. In

2011 proceedings of the international conference on security

and cryptography (SECRYPT) (pp. 25–36).

205. Virvilis, N., Mylonas, A., Tsalis, N., & Gritzalis, D. (2015).

Security busters: Web Browser security vs. rogue sites. Computers & Security, 52, 90–105.

206. Li, F., Huang, C.-T., Huang, J., & Peng, W. (2014). Feedbackbased smartphone strategic sampling for BYOD security. In 2014

23rd international conference on computer communication and

networks (ICCCN) (pp. 1–8).

207. Armando, A., Merlo, A., Migliardi, M., & Verderame, L. (2013).

Breaking and fxing the android launching fow. Computers &

Security, 39(Part A), 104–115.

208. Cheon, W. B., Heo, K., Lim, W. G., Park, W. H., & Chung, T.

M. (2011). The new vulnerability of service set identifer (SSID)

using QR code in android phone. In 2011 international conference on information science and applications (pp. 1–6).

209. Hua, J., & Sakurai, K. (2013). Botnet command and control

based on Short Message Service and human mobility. Computer

Networks, 57, 579–597.

210. Pan, J., & Chun Che, F. (2013). An offensive containment

strategy based on Malware’s attack patterns. In 2013 international conference on machine learning and cybernetics (pp.

1631–1636).

211. Dixon, B., & Mishra, S. (2013). Power based malicious code

detection techniques for smartphones. In 2013 12th IEEE international conference on trust, security and privacy in computing

and communications (pp. 142–149).

212. Alfalqi, K., Alghamdi, R., & Waqdan, M. (2015). Android

platform malware analysis. International Journal of Advanced

Computer Science and Applications (IJACSA). https://doi.

org/10.14569/IJACSA.2015.060120

213. Amamra, A., Robert, J. M., & Talhi, C. (2015). Enhancing malware detection for Android systems using a system call fltering

and abstraction process. Security and Communication Networks,

8, 1179–1192.

214. Amos, B., Turner, H., & White, J. (2013). Applying machine

learning classifers to dynamic Android malware detection at

scale. In 2013 9th international wireless communications and

mobile computing conference (IWCMC) (pp. 1666–1671).

215. Amamra, A., Talhi, C., & Robert, J. M. (2012). Performance

evaluation of multi-pattern matching algorithms on smartphone.

In 2012 seventh international conference on broadband, wireless computing, communication and applications (BWCCA) (pp.

329–334).

216. Merlo, A., Costa, G., Verderame, L., & Armando, A. (2016).

Android vs. SEAndroid: An empirical assessment. Pervasive and

Mobile Computing, 30, 113–131.

217. Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Pastrana,

S. (2015). Power-aware anomaly detection in smartphones: An

analysis of on-platform versus externalized operation. Pervasive

and Mobile Computing, 18, 137–151.

218. Krombholz, K., Frühwirt, T., Rieder, Kapsalis, I., et al. (2015).

QR code security—How secure and usable apps can protect

users against malicious QR codes. In 2015 10th international

conference on availability, reliability and security (ARES) (pp.

230–237).

219. Gelenbe, E., Görbil, G., Tzovaras, D. K., Liebergeld, S., García,

D., Baltatu, M., et al. (2013). NEMESYS: Enhanced network

security for seamless service provisioning in the smart mobile

ecosystem. In Information sciences and systems (pp. 369–378).

Berlin: Springer.

 

220. Lindorfer, M., Neugschwandtner, M., Weichselbaum, L., Fratantonio, Y., van den Veen, V., & Platzer, C. (2014). ANDRUBIS—1,000,000 apps later: A view on current android malware

behaviors. In 2014 third international workshop on building

analysis datasets and gathering experience returns for security

(BADGERS) (pp. 3–17).

221. Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. In 2012 IEEE symposium on security

and privacy (pp. 95–109).

222. Pieterse, H., & Burke, I. (2015). Evolution study of android botnets. In Iccws 2015—The proceedings of the 10th international

conference on cyber warfare and security: ICCWS2015 (p. 232).

223. Su, X., Chuah, M., & Tan, G. (2012). Smartphone dual defense

protection framework: Detecting malicious applications in

android markets. In 2012 eighth international conference on

mobile ad-hoc and sensor networks (MSN) (pp. 153–160).

224. Attar, A. E., Khatoun, R., & Lemercier, M. (2014). Trimming

approach of robust clustering for smartphone behavioral analysis.

In 2014 12th IEEE international conference on embedded and

ubiquitous computing (EUC) (pp. 315–320).

225. Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Blasco,

J. (2014). Dendroid: A text mining approach to analyzing and

classifying code structures in android malware families. Expert

Systems with Applications, 41, 1104–1117.

226. Jang, J.-W., Kang, H., Woo, J., Mohaisen, A., & Kim, H. K.

(2015). Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information. Digital Investigation, 14, 17–35.

227. Mylonas, A., Dritsas, S., Tsoumas, B., & Gritzalis, D. (2011).

On the feasibility of malware attacks in smartphone platforms. In

International conference on e-business and telecommunications

(pp. 217–232).

228. Tang, W., Jin, G., He, J., & Jiang, X. (2011). Extending android

security enforcement with a security distance model. In 2011

international conference on internet technology and applications

(iTAP) (pp. 1–4).

229. Kuehnhausen, M., & Frost, V. S. (2013). Trusting smartphone

Apps? To install or not to install, that is the question. In 2013

IEEE international multi-disciplinary conference on cognitive

methods in situation awareness and decision support (CogSIMA)

(pp. 30–37).

230. Wu, B., Lu, T., Zheng, K., Zhang, D., & Lin, X. (2014). Smartphone malware detection model based on artifcial immune system. China Communications, 11, 86–92.

231. Rashidi, B., Fung, C., & Vu, T. (2015). Dude, ask the experts!:

Android resource access permission recommendation with RecDroid. In 2015 IFIP/IEEE international symposium on integrated

network management (IM) (pp. 296–304).

232. Shastry, A., Kantarcioglu, M., Zhou, Y., & Thuraisingham, B.

(2012). Randomizing smartphone malware profles against statistical mining techniques (pp. 239–254). Berlin: Springer.

233. Alam, M. S. & Vuong, S. T. (2013). Random forest classifcation for detecting android malware. In 2013 IEEE international

conference on green computing and communications and IEEE

Internet of Things and IEEE cyber, physical and social computing (pp. 663–669).

234. Meskini, S., Nassif, A. B., & Capretz, L. F. (2013). Reliability

models applied to mobile applications. In 2013 IEEE seventh

international conference on software security and reliability

companion (pp. 155–162).

235. Yas, Q. M., et al. (2018). Comprehensive insights into evaluation and benchmarking of real-time skin detectors: Review,

open issues & challenges, and recommended solutions. Measurement, 114, 243–260. https://doi.org/10.1016/j.measuremen

t.2017.09.027.

 

236. Zaidan, A. A., et al. (2018). A review on smartphone skin cancer diagnosis apps in evaluation and benchmarking: coherent

taxonomy, open issues and recommendation pathway solution.

Health and Technology, 8(4), 223–238. https://doi.org/10.1007/

s12553-018-0223-9.

237. Beikkhakhian, Y., Javanmardi, M., Karbasian, M., & Khayambashi, B. (2015). The application of ISM model in evaluating

agile suppliers selection criteria and ranking suppliers using

fuzzy TOPSIS-AHP methods. Expert Systems with Applications,

42(15), 6224–6236.

238. Ortiz Barrios, M. A., Nino, C., Patricia, J., La De Hoz, A. A., De

Felice, F., & Petrillo, A. (2016). An integrated approach of AHPDEMATEL methods applied for the selection of allied hospitals

in outpatient service. International Journal of Medical Engineering and Informatics, 8(2), 87–107.

239. Yoon, K. P., & Hwang, C.-L. (1995). Multiple attribute decision

making: an introduction (Vol. 104). London: Sage publications.

240. Nilsson, H., Nordström, E.-M., & Öhman, K. (2016). Decision

support for participatory forest planning using AHP and TOPSIS.

Forests, 7(5), 100.

241. Jumaah, F. M., et al. (2018). Decision-making solution based

multi-measurement design parameter for optimization of GPS

receiver tracking channels in static and dynamic real-time positioning multipath environment. Measurement, 118, 83–95. https

://doi.org/10.1016/j.measurement.2018.01.011.

242. Zaidan, A. A., et al. (2015). Evaluation and selection of opensource EMR software packages based on integrated AHP and

TOPSIS. Journal of Biomedical Informatics, 53, 390–404.

243. Zaidan, A. A., et al. (2015). Multi-criteria analysis for OS-EMR

software selection problem: A comparative study. Decision Support Systems, 78, 15–27.

244. Abdullateef, B. N., et al. (2016). An evaluation and selection

problems of OSS-LMS packages. SpringerPlus, 5(1), 1–35.

245. Yas, Q. M., et al. (2017). Towards on develop a framework for

the evaluation and benchmarking of skin detectors based on artifcial intelligent models using multi-criteria decision-making

techniques. International Journal of Pattern Recognition and

Artifcial Intelligence, 31(03), 1759002.

246. Zaidan, B. B., et al. (2017). A new digital watermarking evaluation and benchmarking methodology using an external group of

evaluators and multi-criteria analysis based on ‘large-scale data’.

Software: Practice and Experience, 47(10), 1365–1392.

247. Zaidan, B. B., & Zaidan, A. A. (2017). Software and hardware FPGA-based digital watermarking and steganography

approaches: Toward new methodology for evaluation and benchmarking using multi-criteria decision-making techniques. The

Journal of Circuits, Systems and Computers, 26(07), 1750116.

248. Zaidan, B. B., Zaidan, A. A., Abdul Karim, H., & Ahmad, N. N.

(2017). A new approach based on multi-dimensional evaluation

and benchmarking for data hiding techniques. International Journal of Information Technology & Decision Making, 17, 1–42.

249. Qader, M. A., et al. (2017). A methodology for football players

selection problem based on multi-measurements criteria analysis.

Measurement: Journal of the International Measurement Confederation, 111, 38–50.

250. Jumaah, F. M., et al. (2018). Technique for order performance

by similarity to ideal solution for solving complex situations in

multi-criteria optimization of the tracking channels of GPS baseband telecommunication receivers. Telecommunication Systems,

68(3), 425–443.

251. Rahmatullah, B., et al. (2017). Multi-complex attributes analysis

for optimum GPS baseband receiver tracking channels selection.

In 2017 4th international conference on control, decision and

information technologies, CoDIT 2017 (Vol. 2017–Janua, pp.

1084–1088)

 

252. Salman, O. H., et al. (2017). Novel methodology for triage and

prioritizing using “big data” patients with chronic heart diseases

through telemedicine environmental. International Journal of

Information Technology & Decision Making, 16(05), 1211–1245.

253. Zaidan, B. B., & Zaidan, A. A. (2018). Comparative study on

the evaluation and benchmarking information hiding approaches

based multi-measurement analysis using TOPSIS method with

diferent normalisation, separation and context techniques. Measurement : Journal of the International Measurement Confederation, 117, 277–294.

254. Kalid, N., et al. (2018). Based on real time remote health monitoring systems: A new approach for prioritization ‘large scales

data’ patients with chronic heart diseases using body sensors and

communication technology. Journal of Medical Systems, 42(4),

69.

255. Alsalem, M. A., et al. (2018). Systematic review of an automated

multiclass detection and classifcation system for acute Leukaemia in terms of evaluation and benchmarking, open challenges,

issues and methodological aspects. Journal of Medical Systems,

42(11), 204.

256. Enaizan, O., et al. (2018). Electronic medical record systems:

Decision support examination framework for individual, security

and privacy concerns using multi-perspective analysis. Health

and Technology, 8, 1–28.

257. Salih, M. M., et al. (2019). Survey on fuzzy TOPSIS state-ofthe-art between 2007–2017. Computers & Operations Research,

104, 207–227.

258. Kalid, N., et al. (2018). Based real time remote health monitoring

systems: A review on patients prioritization and related ‘big data’

using body sensors information and communication technology.

Journal of Medical Systems, 42(2), 30.

259. Albahri, A. S., et al. (2018). Real-time fault-tolerant mHealth

System: Comprehensive review of healthcare services, opens

issues, challenges and methodological aspects. Journal of Medical Systems, 42(8), 137.

260. Albahri, O. S., et al. (2018). Real-time remote health-monitoring

systems in a medical centre: A review of the provision of healthcare services-based body sensor information, open challenges

and methodological aspects. Journal of Medical Systems, 42(9),

164.

261. Albahri, A. S., et al. (2019). Based multiple heterogeneous wearable sensors: A smart real-time health monitoring structured for

hospitals distributor. IEEE Access, 7, 37269–37323. https://doi.

org/10.1109/ACCESS.2019.2898214.

262. Shankar, V. G., Somani, G., Gaur, M. S., Laxmi, V., & Conti,

M. (2017). AndroTaint: An efcient android malware detection

framework using dynamic taint analysis. In 2017 ISEA Asia security and privacy (ISEASP) (pp. 1–13).

263. Fan, M., Liu, J., Wang, W., Li, H., Tian, Z., & Liu, T. (2017).

DAPASA: Detecting android piggybacked apps through sensitive

subgraph analysis. IEEE Transactions on Information Forensics

and Security, 12, 1772–1785.

264. Ajaeiya, G., Elhajj, I. H., Chehab, A., Kayssi, A., & Kneppers,

M. (2018). Mobile Apps identifcation based on network fows.

Knowledge and Information Systems, 55, 771–796.

265. Papadopoulos, H., Georgiou, N., Eliades, C., & Konstantinidis,

A. (2018). Android malware detection with unbiased confdence

guarantees. Neurocomputing, 280, 3–12.

266. Ham, Y. J., Choi, W. B., Lee, H. W., Lim, J., & Kim, J. N. (2012).

Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities. In

Proceedings of 2012 2nd international conference on computer

science and network technology (pp. 371–375).

267. Tan, Y.-A., Xue, Y., Liang, C., Zheng, J., Zhang, Q., Zheng,

J., et al. (2018). A root privilege management scheme with

 

revocable authorization for Android devices. Journal of Network

and Computer Applications, 107, 69–82.

268. Wang, H., He, H., & Zhang, W. (2018). Demadroid: Object reference graph-based malware detection in android. Security and

Communication Networks. https://doi.org/10.1155/2018/70641

31.

269. Wang, X., Yang, Y., & Zeng, Y. (2015). Accurate mobile malware detection and classifcation in the cloud. SpringerPlus, 4,

583.

270. Lu, Y., Zulie, P., Jingju, L., & Yi, S. (2013). Android malware

detection technology based on improved Bayesian classifcation.

In 2013 third international conference on instrumentation, measurement, computer, communication and control (pp. 1338–1341).

271. Fazeen, M., & Dantu, R. (2014). Another free app: Does it have

the right intentions? In 2014 twelfth annual international conference on privacy, security and trust (pp. 282–289).

272. Lindorfer, M., Neugschwandtner, M., & Platzer, C. (2015).

MARVIN: Efcient and comprehensive mobile app classifcation

through static and dynamic analysis. In 2015 IEEE 39th annual

computer software and applications conference (pp. 422–433).

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.