• Jun 14, 2017 News!Vol.8, No.5 has been indexed by EI (Inspec).   [Click]
  • Jul 19, 2017 News!Vol.9, No.4 has been published with online version. 16 peer reviewed articles from 16 specific areas are published in this issue.   [Click]
  • Jun 14, 2017 News!Vol.9, No.3 has been published with online version. 15 peer reviewed articles from 8 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2012 Vol.4(2): 212-216 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.453

A Review of Malicious Code Detection Techniques for Mobile Devices

Lamia Ketari and Mohammadi Akheela Khanum
Abstract—With the advent and rising popularity of wireless systems, there is a proliferation of small-enabled devices such as PDAs, mobile phones, etc. While these devices are becoming more and more preferable by all age groups, they also pose the threat of being vulnerable to malicious code (e.g.: viruses, trojans, worms, etc). In fact, the mobile devices rely on open and public transmission media. Besides, open platforms are becoming popular in smart phones. In this context, these devices have become more capable, providing users with all conveniences, ranging from traditional phone usage to supporting multiple features like e-mail access, playing games, software downloading and also e-banking. As the capabilities of these devices increase, the threat of malicious code (also called malware) targeting them also increased. It is believed that the evolution of mobile malware will take a similar direction as the PC malware. In this paper, we conducted a questionnaire based survey to know about the mobile device security concern among the users. The results indicate a high awareness but a low use of strong security measures. Then, we explore the various mobile phone vulnerabilities. A review of malicious code detection techniques for mobile devices are presented and discussed.

Index Terms—Malware, malicious code detection techniques, mobile devices.

Authors are with the department of Information Technology in College of Computers and Information Sciences, at King Saud University, Kingdom of Saudi Arabia (e-mail:lketari@ksu.edu.sa, kakheela@ksu.edu.sa).

[PDF]

Cite: Lamia Ketari and Mohammadi Akheela Khanum, "A Review of Malicious Code Detection Techniques for Mobile Devices," International Journal of Computer Theory and Engineering vol. 4, no. 2, pp. 212-216, 2012.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com