**Author details**

Unlike hybrid detection and analysis schemes taking advantage of both static and dynamic analysis, as well as from local and remote combined implementation or execution, are generally common for PC equipment, these schemes are not common for mobile devices. Most solutions combine static and dynamic analysis methods or local and remote deployments but not both of them, as this would require too many compromises to be achieved with the cur-

**Figure 7.** Some common dynamic analysis features and algorithms that are used to process them for different research

The continuous development and fast change of the smart devices market has promoted an increase in the number of services and applications offered. As these devices integrate to the users every day activities, they become very attractive targets for cyber criminals. In this sense, malicious software (malware) has become a main security issue in this area. Although malware is not a new problem in the IT industry, differences between PC and smart devices make smart devices security a different problem bounded to the particular features of mobile devices. Moreover, the big number of stakeholders ranging from device manufactures to communication service providers creates a highly heterogeneous environment where attack surfaces characterization becomes a very complex task. In this context, this chapter aimed to present an overview of the fundamental aspects for Android malware

As it can be deduced from the information discussed above, generally speaking there is a core set of analysis techniques and resource data that have been utilized in multiple research approaches in order to identify and detect malicious software. This observation may be obvious as the identified features are core elements of the Android security architecture,

rent technologies [18].

approaches, based on [14].

208 Smartphones from an Applied Research Perspective

analysis and detection.

**6. Conclusions**

Abraham Rodríguez-Mota1,3\*, Ponciano J. Escamilla-Ambrosio<sup>2</sup> and Moisés Salinas-Rosales<sup>2</sup>

\*Address all correspondence to: arodrigm@cic.ipn.mx

1 ESIME Zacatenco, Instituto Politécnico Nacional, Mexico City, Mexico

2 CIC, Instituto Politécnico Nacional, Mexico City, Mexico

3 Centro de Investigación en Computación, Laboratorio de Ciberseguridad, Mexico City, Mexico
