Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

A Survey on Various Malware Detection Techniques on Mobile Platform

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Aashima Malhotra, Karan Bajaj

Aashima Malhotra and Karan Bajaj. Article: A Survey on Various Malware Detection Techniques on Mobile Platform. International Journal of Computer Applications 139(5):15-20, April 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Aashima Malhotra and Karan Bajaj},
	title = {Article: A Survey on Various Malware Detection Techniques on Mobile Platform},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {139},
	number = {5},
	pages = {15-20},
	month = {April},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


With the rapid arrival of mobile platforms on the market, android Platform has become a market leader in 2015 Q2, according to IDC. As Android has ruling most of the market, the problem of malware threats and security is also increasing. In this review paper, a fastidious study of the terms related to mobile malware and the techniques used for the detection of malware is done. Some proposed methods and type of approaches used in those methods are also summarized.


  1. Schmidt A.D. 2011. Detection of Smartphone Malware, doctoral diss., Berlin Institute of Technology, Berlin, Germany.
  2. Landage, J. and Wankhade, M. P. 2013. Malware and Malware Detection Techniques: A Survey, International Journal of Engineering Research and Technology, Vol. 2, no. 12, 2013.
  3. Felt, Porter, A., Finifter, M., Chin, E., Hanna, S. and Wagner, D. 2011. A survey of mobile malware in the wild, Proc. 1st ACM workshop on Security and privacy in smartphones and mobile devices, ACM, New York, 2011, pp. 3-14.
  4. Dini, Gianluca, Martinelli, F. and Sgandurra, D.2013. MADAM: A Multi-level Anomaly Detector for Android Malware, Journal of MMM-ACNS, vol. 12, 2013, pp. 240-253.
  5. Huang, C.Y. , Tsai, Y.T. and Hsu, C.H. 2013. Performance evaluation on permission-based detection for android malware, Advances in Intelligent Systems and Applications, Springer, Berlin Heidelberg, vol. 2, 2013, pp. 111-120.
  6. Shabtai, A., Moskovitch, R., Elovici, Y. and Glezer, C. 2009. Detection of malicious code by applying machine learning classifiers on static features: A state-of-art survey, Journal of Information Security Technical Report, vol. 14, 2009, pp. 16-29.
  7. Christodorescui, S. and Jha, S. 2006. Static analysis of executables to detect malicious patterns, Wisconsin Univ-Madison Dept Of Computer Sciences, 2006.
  8. Schmidt, A.D. 2009. Static analysis of executables for collaborative malware detection on android, In Communications IEEE International Conference, Dresden, Germany, 2009, pp. 1-5.
  9. Schmidt, A.D. , Schmidt, H.G., Clausen, J., Yuksel, K.A., Kiraz, O., Camtepe, A. and Albayrak, S. 2008. Enhancing security of linux-based android devices, Proc. of 15th International Linux Kongress, Lehmann, Hamberg, Germany, 2008.
  10. Schmidt, A.D., Camtepe, A. and Albayrak, S. 2010. Static smartphone malware detection, Proc. of the 5th Security Research Conference (Future Security), 2010, pp. 146.
  11. Blasing, T., Schmidt, A.D., Batyuk, L., Camtepe, S. A. and Albayrak, S. 2010. An android application sandbox system for suspicious software detection, 5th International Conference on Malicious and Unwanted Software (Malware), Nancy, France, 2010, pp. 55-62.
  12. Portokalidis, G., Homburg, P., Anagnostakis, K. and Bos, H. 2010. Paranoid android: versatile protection for smartphones, Proc. of the 26th Annual Computer Security Applications Conference, ACSAC, ACM, New York, 2010, pp. 347-356.
  13. Shabtai, A. , Kanonov, U. and Elovici, Y. 2010. Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method, Journal of Systems and Software, vol. 83, 2010, pp. 1524-1537.
  14. Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C. and Weiss, Y. 2012. Andromaly: a behavioural malware detection framework for android devices, Journal of Intelligent Information Systems, vol. 38, 2012, pp. 161-190.
  15. Enck, William, Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L. P., Jung, J., McDaniel, P. and Sheth, A.N. 2014 TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones, Journal of ACM Transactions on Computer Systems (TOCS), vol. 32, 2014, article 5.
  16. Grace, M., Zhou, Y., Zhang, Q., Zou, S. and Jiang, X. 2012 Risk-Ranker: scalable and accurate zero-day Android malware detection, Proc. of MobiSys, New York, NY, USA, 2012, pp. 281-294.
  17. Egele, M., Kruegel, C., Kirda, E., and Vigna, G. 2011. PiOS: detecting privacy leaks in iOS applications, In NDSS, 18th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, 2011.
  18. Burguera, I., Zurutuza, U. and Tehrani, S.N. 2011. Crowdroid: behaviour-based malware detection system for android, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, ACM, Chicago, Illinois, USA, 2011, pp. 15-26.
  19. Fan, y., ye, y. and Chen, L. 2016. Malicious sequential pattern mining for automatic malware detection, Expert systems with application (Jan. 2016).


Malware, Types of malware, Detection techniques, Permissions.