6Malware Analysis Techniques in Android‐Based Smartphone Applications
Geetika Munjal, Avi Chakravarti, and Utkarsh Sharma
Amity School of Engineering and Technology, Amity University, Noida, Uttar Pradesh, India
6.1 Introduction
Due to a decline in price and an expansion of features and services, mobile devices like smartphones and tablets have recently gained a lot of popularity. Additionally, the increasing trend of bringing your own device (BYOD) regulations into organizations has facilitated the adoption of these technologies. These policies encourage the use of such technologies for routine communication and to support commercial transactions and enterprise systems, all of which pose new security threats. Operating systems have also been crucial in this situation for the acceptance and growth of mobile devices and apps, allowing for the emergence of harmful malware [1]. This is true of the Android OS, as it has grown to be a significant part of the market for mobile devices as well as an appealing target for hackers because it is an open‐source OS.
The Android development community, the Open Handset Alliance manufacturers, and Google have collectively put a lot of effort to increase the security of Android. Yet new security threats continue to appear and develop, and this is a significant concern [2]. This chapter presents some recent results and trends in the study of Android malware analysis and detection. This chapter first provides a quick overview of the security ...
Get Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.