An Overview of Mobile Malware and Solutions

Abstract

Mobile Security has been a rapidly growing field in the security area. With the increases of mobile devices and mobile applications, the need for mobile security has increased dramatically over the past several years. Many research and development projects on mobile security are ongoing in government, industry and academia. In this paper, we present an analysis of current mobile security problems and propose the possible solutions to malware threats. Our experiments show antimalware can protect mobile device from different types of mobile malware threats effectively.

Share and Cite:

Wu, F. , Narang, H. and Clarke, D. (2014) An Overview of Mobile Malware and Solutions. Journal of Computer and Communications, 2, 8-17. doi: 10.4236/jcc.2014.212002.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] (2009) Android, the World’s Most Popular Mobile Platform, 2009.
http://developer.android.com/about/index.html
[2] Becher, M., et al. (2009) Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. http://www5.rz.rub.de:8032/imperia/md/content/wolf/ieee_mobile.pdf
[3] Naumann, D. (2014) Mobile App Security Research.
http://research.stevens.edu/mobile-app-security
[4] Dimensional Research (2012) The Impact Act of Mobile Devices Information Security: A Survey of It Professionals.
http://www.checkpoint.com/downloads/products/check-point-mobile-security-survey-report.pdf
[5] Ian, P. (2012) Mobile Security Threats Rise. PC World.
http://www.pcworld.com/article/262017/mobile_security_threats_rise.html
[6] TechTerms (2014) Malware.http://www.techterms.com/definition/malware
[7] TechTerms (2014) Spyware. http://www.techterms.com/definition/spyware
[8] Arsene, L. (2012) An Android Malware Analysis: DroidKungFu.
http://www.hotforsecurity.com/blog/an-android-malware-analysis-droidkungfu-4474.html.
[9] Krause, K. (2011) DroidKungFu Malware Evolves to Avoid Detection.
http://phandroid.com/2011/07/01/droidkungfu-malware-evolves-to-avoid-detection/
[10] Kindsight (2012) Malware Analysis Report.
http://www.kindsight.net/sites/default/files/Kindsight_Malware_Analysis-ZeroAcess-Botnet-final.pdf
[11] Lookout (2011) Lookout Mobile Security Technical Tear Down.
https://blog.lookout.com/wp-content/uploads/2011/03/COMPLETE-DroidDream-Technical-Tear-Down_Lookout-Mobile-Security.pdf

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.