Journal title : 2017 International Conference on Intelligent Computing and Control Systems (ICICCS)
Publisher : IEEE
790 Views Research reports
The recent boom in Android mobile device usage has caused a shift in the information technology and has affected the way how information and data are stored, shared among the mobile users. The advent of social networking applications also demands the availability of resources that can be shared among the authentic users. This paper reviews and compares the available techniques and solutions for detecting Unexpected Permission Authorization to Mobile Apps. It is observed that malware for the android system is also growing significantly, current solutions for detecting malware on smartphones are still ineffective.
DOI : https://doi.org/10.1109/ICCONS.2017.8250682
Views: 1K
Views: 1K
Views: 879