Feature-Centric Approaches to Android Malware Analysis: A Survey

📅 2025-09-12
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Android malware exploits platform openness to compromise IoT security, causing data breaches and service disruptions. This paper conducts a systematic literature review to comprehensively categorize and evaluate four classes of feature extraction techniques—static, dynamic, hybrid, and graph neural network-based—within a feature-centric evaluation framework. The framework explicitly assesses trade-offs among computational efficiency, obfuscation resilience, and resource overhead. Identifying critical gaps in scalability and contextual adaptability under IoT constraints—namely, stringent latency, memory, and energy budgets—the study proposes design principles and a development roadmap for edge-deployable lightweight features. It bridges a key research gap in co-optimizing feature engineering and hardware resource constraints for cross-platform Android malware detection. The work thus provides both theoretical foundations and practical guidelines to enhance the deployability, robustness, and long-term security of Android malware detection systems in resource-constrained IoT environments.

Technology Category

Application Category

📝 Abstract
Sophisticated malware families exploit the openness of the Android platform to infiltrate IoT networks, enabling large-scale disruption, data exfiltration, and denial-of-service attacks. This systematic literature review (SLR) examines cutting-edge approaches to Android malware analysis with direct implications for securing IoT infrastructures. We analyze feature extraction techniques across static, dynamic, hybrid, and graph-based methods, highlighting their trade-offs: static analysis offers efficiency but is easily evaded through obfuscation; dynamic analysis provides stronger resistance to evasive behaviors but incurs high computational costs, often unsuitable for lightweight IoT devices; hybrid approaches balance accuracy with resource considerations; and graph-based methods deliver superior semantic modeling and adversarial robustness. This survey contributes a structured comparison of existing methods, exposes research gaps, and outlines a roadmap for future directions to enhance scalability, adaptability, and long-term security in IoT-driven Android malware detection.
Problem

Research questions and friction points this paper is trying to address.

Surveying Android malware analysis methods for IoT security
Analyzing feature extraction techniques across multiple analysis approaches
Identifying research gaps and future directions for IoT malware detection
Innovation

Methods, ideas, or system contributions that make the work stand out.

Hybrid analysis balancing accuracy resources
Graph-based methods enhancing semantic robustness
Systematic comparison exposing research gaps roadmap
🔎 Similar Papers
No similar papers found.
S
Shama Maganur
Gianforte School of Computing, Montana State University, Bozeman, MT 59717, USA
Y
Yili Jiang
Department of Computer Science, Georgia State University, Atlanta, GA 30303, USA
Jiaqi Huang
Jiaqi Huang
University of Central Missouri
CybersecurityIoV
Fangtian Zhong
Fangtian Zhong
Assistant Prof. @ Montana State University
Software SecuritySystem Security