General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2012 Vol.4(2): 212-216 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.453

A Review of Malicious Code Detection Techniques for Mobile Devices

Lamia Ketari and Mohammadi Akheela Khanum

Abstract—With the advent and rising popularity of wireless systems, there is a proliferation of small-enabled devices such as PDAs, mobile phones, etc. While these devices are becoming more and more preferable by all age groups, they also pose the threat of being vulnerable to malicious code (e.g.: viruses, trojans, worms, etc). In fact, the mobile devices rely on open and public transmission media. Besides, open platforms are becoming popular in smart phones. In this context, these devices have become more capable, providing users with all conveniences, ranging from traditional phone usage to supporting multiple features like e-mail access, playing games, software downloading and also e-banking. As the capabilities of these devices increase, the threat of malicious code (also called malware) targeting them also increased. It is believed that the evolution of mobile malware will take a similar direction as the PC malware. In this paper, we conducted a questionnaire based survey to know about the mobile device security concern among the users. The results indicate a high awareness but a low use of strong security measures. Then, we explore the various mobile phone vulnerabilities. A review of malicious code detection techniques for mobile devices are presented and discussed.

Index Terms—Malware, malicious code detection techniques, mobile devices.

Authors are with the department of Information Technology in College of Computers and Information Sciences, at King Saud University, Kingdom of Saudi Arabia (e-mail:lketari@ksu.edu.sa, kakheela@ksu.edu.sa).

[PDF]

Cite: Lamia Ketari and Mohammadi Akheela Khanum, "A Review of Malicious Code Detection Techniques for Mobile Devices," International Journal of Computer Theory and Engineering vol. 4, no. 2, pp. 212-216, 2012.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.