Review on Mobile Threats and Detection Techniques

Lovi Dua, Divya Bansal
2014 International Journal of Distributed and Parallel systems  
Since last-decade, smart-phones have gained widespread usage. Mobile devices store personal details such as contacts and text messages. Due to this extensive growth, smart-phones are attracted towards cyber-criminals. In this research work, we have done a systematic review of the terms related to malware detection algorithms and have also summarized behavioral description of some known mobile malwares in tabular form. After careful solicitation of all the possible methods and algorithms for
more » ... ction of mobile-based malwares, we give some recommendations for designing future malware detection algorithm by considering computational complexity and detection ration of mobile malwares.
doi:10.5121/ijdps.2014.5403 fatcat:fagpq6bx2vbsdbf6o6wvaaldge