Table 2. Comparison with previous review articles.
Summarization of previous related review articles in detecting malware.
| References | Ma & Sharbaf (2013) | Fang, Han & Li (2014) | Feizollah et al. (2015) | Sufatrio et al. (2015) | Schmeelk, Yang & Aho (2015) | Pan et al. (2020) | This paper |
|---|---|---|---|---|---|---|---|
| Title | Investigation of Static and Dynamic Android Anti-virus Strategies | Permission-based Android Security: Issues and Countermeasures | A Review on Feature Selection in Mobile Malware Detection | Securing Android: A Survey, Taxonomy, and Challenges | Android Malware Static Analysis Techniques | A Systematic Literature Review of Android Malware Detection Using Static Analysis | Malware Detection using Static Analysis for Android: A Review and Open Research Issue |
| Year | 2013 | 2014 | 2015 | 2015 | 2015 | 2020 | Current paper |
| Citations | 9 | 132 | 172 | 146 | 21 | 1 | |
| Dataset | ✓ | ✓ | ✓ | ||||
| Reverse engineer tools | ✓ | ✓ | ✓ | ||||
| All static features | ✓ | ✓ | ✓ | ✓ | |||
| All classifications (Machine learning, deep learning, graph, and others) | ✓ | ||||||
| Obfuscation constraints and methods to overcome it | ✓ |