Ransomware is a major and rapidly
growing threat at present. Malware analysis should be done irrespective of the
unknown and stealthy malware attack characteristics in order to achieve a
secure information world. This is possible only when efficient malware
detection techniques are employed.
of Windows malware detected by Quick Heal Labs in 2016 is given in figure 1.
Figure 1 Windows Malware Detection Statistics in
Fig 2 represents
the statistics of Android samples reported by Quick Heal in 2016.
Figure 2 Android Samples Growth (2013-2016)
detection on PC and mobile devices
To understand the current security
problems affecting PCs and smartphones, we review threats, vulnerabilities and
attacks specific to smartphones and examine the existing security solutions to
protect them. In particular, we survey the literature over the period 1987-2017,
by focusing our attention on PC-based (Windows) and Mobile-based (Android) malwares.
Current mobile devices (smartphones)
provide lots of the capabilities of traditional PCs and, in addition, offer a
large selection of connectivity options, such as IEEE 802.11, Bluetooth, GSM,
GPRS, UMTS, and HSPA. This plethora of appealing features has led to a
widespread diffusion of smartphones and is now an ideal target for attackers.
In the beginning, smartphones were packaged with standardized Operating System
(OS): less heterogeneity in OS allowed attackers to exploit just a single
vulnerability to attack a large number of different kinds of devices by causing
major security outbreaks. Some of the operating systems for smartphones were
Symbian OS, Windows Mobile, Android and iPhone OS.
Even if global sales of millions of
smartphones devices are observed, the number of mobile malware is still small
compared to that of PC malware. Smartphone malwares are evolving in the same
trend as malware for PCs. As more users download and install third-party
applications for smartphones, the chances of installing malicious programs
increases as well. Mobile malware can spread through several and distinct
vectors, such as an SMS containing a link to a site where a user can download
the malicious code, an MMS with infected attachments, or infected programs
received via Bluetooth. The main goals of malware targeted at smartphones
include theft of personal data stored in the phone or the user’s credit. Many
fake mobile applications tricks shoppers into entering personal credit card
information, disclosing Facebook and Gmail logins or downloading malware that
could potentially steal or locks devices and hold it ransom.