Android Security Vulnerabilities, Malware, Anti-Malware Solutions, and Evasion Techniques

Security

Authors

  • Mahtab Khalid Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan
  • Ahthasham Sajid Riphah Institute of Systems Engineering, Riphah International University, Islamabad
  • Muhammad Usman Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan
  • Mehak Saeed Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan
  • Malik Muhammad Nadeem Department of Information Security and Data Science, Riphah Institute of Systems Engineering, Riphah International University Islamabad, Pakistan
  • Ishu Sharma Chandigarh Group of Colleges, Jhanjeri, Mohali, India

DOI:

https://doi.org/10.62019/abbdm.v4i4.252

Abstract

This paper investigates the vulnerabilities inherent in the Android operating system architecture and examines how malware developers exploit these weaknesses to execute a variety of attacks. These include aggressive advertising, remote control capabilities, financial fraud, privilege escalation, and the leaking of sensitive information. In this paper, we survey a collection of anti-malware techniques and organize these techniques into three canonical classes (static methods, dynamic methods, hybrid methodologies) according to how they are used or implemented with respect to the host operating system. We also evaluate the effectiveness of these techniques against certain types of attacks and summarize them under test categories for reporting results. We also examine the typical countermeasures used by malware authors to disguise their approaches against existing detection methods, such as reintegrating with real applications, using update payloads, executing dynamic code, scrambling dangerous content, and setting traps to act upon only purposely triggered situations. In future work, we suggest research into the capability of reinforcement learning methods to further increase sustainability and adaptability of anti-malware strategies. This Research study aimed at creating more dynamic detection systems for malware by utilizing machine learning techniques that could change in parallel with the tactics used by malware developers. By leveraging this technique, you could drastically boost the efficacy of existing anti-malware solutions that are unable to respond to new threats. As the digital environment changes (and continues to change), Mobile provides threat analysts, fraud / security managers and legal authorities up-to-date circumstantial direction so users can move with confidence within their mobile landscapes.

Downloads

Published

2024-12-22

How to Cite

Android Security Vulnerabilities, Malware, Anti-Malware Solutions, and Evasion Techniques: Security. (2024). The Asian Bulletin of Big Data Management , 4(4), 129-145. https://doi.org/10.62019/abbdm.v4i4.252