Abstract

With the increasing popularity of Android operating system, its security concerns have also been raised to a new horizon in past few years. Different researchers have introduced different approaches in order to mitigate the malware attacks on Android devices and they succeed to provide security up to some extent but these antimalware techniques are still resource inefficient and takes longer time to detect the malicious behavior of applications. In this paper, basic security mechanisms, provided by Google Android, and their limitations are discussed. Also, the existing antimalware techniques which lie under the basic detection approaches are discussed and their limitations are also highlighted. This research proposes a light weight instant malware detector, named as InstDroid, for Android devices that can identify the malicious applications immediately. Through experiments, it is shown that InstDroid is an instant malware detector that provides instant security at low resource consumption, power and memory, in comparison to other well-known commercial antimalware applications.

Highlights

  • Smart phones have become a necessary part of everyday life

  • It gets activated only when any application is installed on the device, performs detection mechanism and stop running in the background. This is how the power consumption at real Android device is very low in comparison to the other malware detectors

  • With the increasing popularity of Android operating system, its security concerns have been raised to a new horizon in past few years

Read more

Summary

Introduction

Smart phones have become a necessary part of everyday life. From businessman to a common person, everyone uses smart phones to perform different tasks depending upon their needs. Android phones store the critical data related to the personal as well as professional life of a person. Android operating system is an open source platform that allows the installation of third party applications from App-stores other than Google play store for example PandaApp [3] and GetJar [4]. This openness becomes the opportunity for malware developers to harm the user‟s data and is the reason for several issues such as invalid access from one resourceful application to the other (information leakage), permission escalation, repackaging application to infuse malicious code and Denial of Service (DoS) attacks

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call