Abstract

Android malware has been in an increasing trend in recent years due to the pervasiveness of Android operating system. Android malware is installed and run on the smartphones without explicitly prompting the users or without the user's permission, and it poses great threats to users such as the leakage of personal information and advanced fraud. To address these threats, various techniques are proposed by researchers and practitioners. Static analysis is one of these techniques, which is widely applied to Android malware detection and can detect malware quickly and prohibit malware before installation. To provide a clarified overview of the latest work in Android malware detection using static analysis, we perform a systematic literature review by identifying 98 studies from January 2014 to March 2020. Based on the features of applications, we first divide static analysis in Android malware detection into four categories, which include Android characteristic-based method, opcode-based method, program graph-based method, and symbolic execution-based method. Then we assess the malware detection capability of static analysis, and we compare the performance of different models in Android malware detection by analyzing the results of empirical evidence. Finally, it is concluded that static analysis is effective to detect Android malware. Moreover, there is a preliminary result that neural network model outperforms the non-neural network model in Android malware detection. However, static analysis still faces many challenges. Thus, it is necessary to derive some novel techniques for improving Android malware detection based on the current research community. Moreover, it is essential to establish a unified platform that is used to evaluate the performance of a series of techniques in Android malware detection fairly.

Highlights

  • With the explosive growth of the mobile market in the last decade, Android has become the largest intelligent operating system

  • Except for 4 systematic literature review (SLR), we find that most studies adopt machine learning model, and the number of studies related to machine learning model is 82, while the number of studies related to statistical model is 12, which only takes up nearly 13%

  • This SLR is performed by 98 studies from 2014 to 2020

Read more

Summary

INTRODUCTION

With the explosive growth of the mobile market in the last decade, Android has become the largest intelligent operating system. Based on these behaviours [2], Android malware can be divided into four categories, which include malware installation (e.g., repacking, update attack, and drive-by download), malware activation, malicious payloads (e.g., privilege escalations, remote control, finance charge, and information collection), and permission abuse To address such threats mentioned above, researchers and practitioners propose various techniques, which mainly include dynamic analysis and static analysis. To have a clear view of Android malware detection using static analysis in the past few years, we perform this systematic literature review (SLR) after identifying thoroughly related studies. We make the discussions and provide the future work in Android malware detection using static analysis The rest of this SLR is organized as follows.

REVIEW PROTOCOL
RESULTS
DISCUSSIONS
LIMITATIONS
CONCLUSION AND FUTURE WORK

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.