“MOBILE MALWARE DETECTION TECHNIQUES”
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 4
Abstract
The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Currently, in the smartphone market, Android is the platform with the highest share. Due to this popularity and also to its open source nature, Android-based smartphones are now an ideal target for attackers. Since the number of malware designed for Android devices is increasing fast, Android users are looking for security solutions aimed at preventing malicious actions from damaging their smartphones. Prior research on malware protection has focused on avoiding the negative impact of the functionality limitations of mobile phones to keep the performance cost within the limitations of mobile phones. From this perspective, we propose and analyze some potential limitation-oriented techniques for effective malware detection and prevention on mobile phones.
Authors and Affiliations
Vinit B. Mohata , Dhananjay M. Dakhane , Ravindra L. Pardhi
Benefits of Learning Management System (LMS) in Indian Education
In today’s scenario, academic institutions are striving to find the right combination of students, faculties, protocols and systems to manage their learning programs. Learning management systems (LMS) are becoming an int...
Experimental Analysis Of Flow Through Rotating Combustion Swirler With Zero Degree Inlet and Outlet Angle Of Guide Vane
Swirling jet is used as a means of controlling flames in combustion chamber. Swirl flow offer an interesting field of study for aerospace & mechanical engineers in general and for combustion engineers in particular s...
Dynamic Time Quantum in Shortest Job First Scheduling Algorithm (DTQSJF) for Unpredictable Burst Time of Processes
In multitasking and time sharing operating system the performance of the CPU depends on waiting time, response time, turnaround time, context switches from the process mainly depends on the scheduling algorithm. Shortest...
Developing a Wireless Ad-Hoc Network using MAC Schemes
A mobile user can connect to a LAN by using a wireless connection which is known as Wireless LAN (WLAN). WLAN uses high frequency waves instead of wire to communicate between nodes. Here signals are of limited range. WLA...
Enigmatic Power of Turing Machines: A Review
Automata are said to be theoretical devices which help in understanding the reasoning behind computations and are considered to be ideal rather than realistic. This is because the actual computers cannot have infinite me...