Mobile application security: malware threats and defenses

Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distri...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE wireless communications 2015-02, Vol.22 (1), p.138-144
Hauptverfasser: Daojing He, Chan, Sammy, Guizani, Mohsen
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 144
container_issue 1
container_start_page 138
container_title IEEE wireless communications
container_volume 22
creator Daojing He
Chan, Sammy
Guizani, Mohsen
description Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. This issue should be addressed by both preventive approaches and effective detection techniques. This article first discusses why smartphones are vulnerable to security attacks. Then it presents malicious behavior and threats of malware. Next, it reviews the existing malware prevention and detection techniques. Besides more research in these directions, it points out efforts from app developers, app store administrators, and users, who are also required to defend against such malware.
doi_str_mv 10.1109/MWC.2015.7054729
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_MWC_2015_7054729</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7054729</ieee_id><sourcerecordid>1800432198</sourcerecordid><originalsourceid>FETCH-LOGICAL-c324t-112e2ec5fb2153bb3f8146cba31093ae6b344256acd28150817068b7a2c988263</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsFbvgpeAFy-pO_uVjTcpfkGLF8XjstlOcEuaxN0E6b93S6sHTzMwzzu8PIRcAp0B0PJ2-TGfMQpyVlApClYekQlIqXOqdHG827nKgWlxSs5iXFMKhZJqQsplV_kGM9v3jXd28F2bRXRj8MP2LtvY5tsGzIbPgHaImW1X2QprbCPGc3JS2ybixWFOyfvjw9v8OV-8Pr3M7xe540wMOQBDhk7WFUsdqorXGoRyleWpNbeoKi4Ek8q6FdMgqYYiVa4Ky1ypNVN8Sm72f_vQfY0YB7Px0WHT2Ba7MRrQlArOoNQJvf6HrrsxtKmdAaU4p5LJMlF0T7nQxRiwNn3wGxu2BqjZuTTJpdm5NAeXKXK1j3hE_MN_rz8rs22T</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1663305259</pqid></control><display><type>article</type><title>Mobile application security: malware threats and defenses</title><source>IEEE Electronic Library (IEL)</source><creator>Daojing He ; Chan, Sammy ; Guizani, Mohsen</creator><creatorcontrib>Daojing He ; Chan, Sammy ; Guizani, Mohsen</creatorcontrib><description>Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. This issue should be addressed by both preventive approaches and effective detection techniques. This article first discusses why smartphones are vulnerable to security attacks. Then it presents malicious behavior and threats of malware. Next, it reviews the existing malware prevention and detection techniques. Besides more research in these directions, it points out efforts from app developers, app store administrators, and users, who are also required to defend against such malware.</description><identifier>ISSN: 1536-1284</identifier><identifier>EISSN: 1558-0687</identifier><identifier>DOI: 10.1109/MWC.2015.7054729</identifier><identifier>CODEN: IWCEAS</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Applications programs ; Availability ; Computer hacking ; Computer information security ; Electronic mail ; Malware ; Mobile communication ; Mobile communication systems ; Smart phones ; Smartphones ; Spyware ; Stores ; Upgrading</subject><ispartof>IEEE wireless communications, 2015-02, Vol.22 (1), p.138-144</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c324t-112e2ec5fb2153bb3f8146cba31093ae6b344256acd28150817068b7a2c988263</citedby><cites>FETCH-LOGICAL-c324t-112e2ec5fb2153bb3f8146cba31093ae6b344256acd28150817068b7a2c988263</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7054729$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7054729$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Daojing He</creatorcontrib><creatorcontrib>Chan, Sammy</creatorcontrib><creatorcontrib>Guizani, Mohsen</creatorcontrib><title>Mobile application security: malware threats and defenses</title><title>IEEE wireless communications</title><addtitle>WC-M</addtitle><description>Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. This issue should be addressed by both preventive approaches and effective detection techniques. This article first discusses why smartphones are vulnerable to security attacks. Then it presents malicious behavior and threats of malware. Next, it reviews the existing malware prevention and detection techniques. Besides more research in these directions, it points out efforts from app developers, app store administrators, and users, who are also required to defend against such malware.</description><subject>Applications programs</subject><subject>Availability</subject><subject>Computer hacking</subject><subject>Computer information security</subject><subject>Electronic mail</subject><subject>Malware</subject><subject>Mobile communication</subject><subject>Mobile communication systems</subject><subject>Smart phones</subject><subject>Smartphones</subject><subject>Spyware</subject><subject>Stores</subject><subject>Upgrading</subject><issn>1536-1284</issn><issn>1558-0687</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkE1Lw0AQhhdRsFbvgpeAFy-pO_uVjTcpfkGLF8XjstlOcEuaxN0E6b93S6sHTzMwzzu8PIRcAp0B0PJ2-TGfMQpyVlApClYekQlIqXOqdHG827nKgWlxSs5iXFMKhZJqQsplV_kGM9v3jXd28F2bRXRj8MP2LtvY5tsGzIbPgHaImW1X2QprbCPGc3JS2ybixWFOyfvjw9v8OV-8Pr3M7xe540wMOQBDhk7WFUsdqorXGoRyleWpNbeoKi4Ek8q6FdMgqYYiVa4Ky1ypNVN8Sm72f_vQfY0YB7Px0WHT2Ba7MRrQlArOoNQJvf6HrrsxtKmdAaU4p5LJMlF0T7nQxRiwNn3wGxu2BqjZuTTJpdm5NAeXKXK1j3hE_MN_rz8rs22T</recordid><startdate>201502</startdate><enddate>201502</enddate><creator>Daojing He</creator><creator>Chan, Sammy</creator><creator>Guizani, Mohsen</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>L7M</scope></search><sort><creationdate>201502</creationdate><title>Mobile application security: malware threats and defenses</title><author>Daojing He ; Chan, Sammy ; Guizani, Mohsen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c324t-112e2ec5fb2153bb3f8146cba31093ae6b344256acd28150817068b7a2c988263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Applications programs</topic><topic>Availability</topic><topic>Computer hacking</topic><topic>Computer information security</topic><topic>Electronic mail</topic><topic>Malware</topic><topic>Mobile communication</topic><topic>Mobile communication systems</topic><topic>Smart phones</topic><topic>Smartphones</topic><topic>Spyware</topic><topic>Stores</topic><topic>Upgrading</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Daojing He</creatorcontrib><creatorcontrib>Chan, Sammy</creatorcontrib><creatorcontrib>Guizani, Mohsen</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE wireless communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Daojing He</au><au>Chan, Sammy</au><au>Guizani, Mohsen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Mobile application security: malware threats and defenses</atitle><jtitle>IEEE wireless communications</jtitle><stitle>WC-M</stitle><date>2015-02</date><risdate>2015</risdate><volume>22</volume><issue>1</issue><spage>138</spage><epage>144</epage><pages>138-144</pages><issn>1536-1284</issn><eissn>1558-0687</eissn><coden>IWCEAS</coden><abstract>Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks. This issue should be addressed by both preventive approaches and effective detection techniques. This article first discusses why smartphones are vulnerable to security attacks. Then it presents malicious behavior and threats of malware. Next, it reviews the existing malware prevention and detection techniques. Besides more research in these directions, it points out efforts from app developers, app store administrators, and users, who are also required to defend against such malware.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/MWC.2015.7054729</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1536-1284
ispartof IEEE wireless communications, 2015-02, Vol.22 (1), p.138-144
issn 1536-1284
1558-0687
language eng
recordid cdi_crossref_primary_10_1109_MWC_2015_7054729
source IEEE Electronic Library (IEL)
subjects Applications programs
Availability
Computer hacking
Computer information security
Electronic mail
Malware
Mobile communication
Mobile communication systems
Smart phones
Smartphones
Spyware
Stores
Upgrading
title Mobile application security: malware threats and defenses
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T08%3A57%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Mobile%20application%20security:%20malware%20threats%20and%20defenses&rft.jtitle=IEEE%20wireless%20communications&rft.au=Daojing%20He&rft.date=2015-02&rft.volume=22&rft.issue=1&rft.spage=138&rft.epage=144&rft.pages=138-144&rft.issn=1536-1284&rft.eissn=1558-0687&rft.coden=IWCEAS&rft_id=info:doi/10.1109/MWC.2015.7054729&rft_dat=%3Cproquest_RIE%3E1800432198%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1663305259&rft_id=info:pmid/&rft_ieee_id=7054729&rfr_iscdi=true