Securing Android: A Survey, Taxonomy, and Challenges

Securing Android: A Survey, Taxonomy, and Challenges
Securing Android: A Survey, Taxonomy, and Challenges
Other Titles:
ACM Computing Surveys
Publication Date:
21 July 2015
Sufatrio, Darell J. J. Tan, Tong-Wei Chua, and Vrizlynn L. L. Thing. 2015. Securing Android: A survey, taxonomy, and challenges. ACM Comput. Surv. 47, 4, Article 58 (May 2015), 45 pages
Recent years have seen a global adoption of smart mobile devices, particularly those based on Android. Android's widespread adoption is, however, also marred with increasingly rampant malware threats. This article gives a survey and taxonomy of existing works that secure Android devices. Based on Android app deployment stages, the taxonomy enables us to analyze schemes that share similar objective and approach and to inspect their key differences. Additionally, this article highlights the limitations of existing works and current challenges. It thus distills the state-of-the-art in Android security research, and identifies potential research directions for safeguarding billions (and keep counting) Android-run devices.
License type:
Funding Info:
© ACM, 2015. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in PUBLICATION, {VOL#47, ISS#4, (2015-07-21)}
Files uploaded:

File Size Format Action
acm-csur-securing-android-oar.pdf 371.19 KB PDF Open