TY - GEN
T1 - Systematic Literature Review on Innovative Techniques for Malware Prevention in Superapps
T2 - 13th Ecuadorian Conference on Information and Communication Technologies, TICEC 2025
AU - Aguilar Lalvay, Jonnathan
AU - Cuzco Tito, Jonnathan
AU - Martínez Solórzano, Renata
AU - Rodríguez Zúñiga, Andrea Paulina
AU - Cedillo, Priscila
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
PY - 2026
Y1 - 2026
N2 - The growth of mobile applications has led to superapps, platforms where small applications known as miniapps provide various services to users. Despite the popularity of these applications, they are also becoming a target for cybercriminals. Consequently, this review sought to answer the following: i) What type of malware represents the greatest threat to superapps? ii) What security tools and techniques are implemented in superapps to prevent or mitigate malware? iii) How do superapps get infected with malware, and what are the most common methods used by attackers? iv) How is research related to this topic being addressed? A total of 467 potential studies were identified. By applying inclusion and extraction criteria validated with Fleiss’ Kappa, 23 papers were selected for the review. The results provide a comprehensive view of the main types of malware affecting superapps, their impact, and the methodologies used to identify threats. These findings can help improve the security of superapps and serve as a foundation for future research to analyze vulnerabilities within them.
AB - The growth of mobile applications has led to superapps, platforms where small applications known as miniapps provide various services to users. Despite the popularity of these applications, they are also becoming a target for cybercriminals. Consequently, this review sought to answer the following: i) What type of malware represents the greatest threat to superapps? ii) What security tools and techniques are implemented in superapps to prevent or mitigate malware? iii) How do superapps get infected with malware, and what are the most common methods used by attackers? iv) How is research related to this topic being addressed? A total of 467 potential studies were identified. By applying inclusion and extraction criteria validated with Fleiss’ Kappa, 23 papers were selected for the review. The results provide a comprehensive view of the main types of malware affecting superapps, their impact, and the methodologies used to identify threats. These findings can help improve the security of superapps and serve as a foundation for future research to analyze vulnerabilities within them.
KW - Superapps
KW - infection methods
KW - malware
KW - miniapps
KW - prevention techniques
KW - security
UR - https://www.scopus.com/pages/publications/105020757418
UR - https://www.mendeley.com/catalogue/74d1d02f-e67e-3c1d-b886-45557b012012/
U2 - 10.1007/978-3-032-08366-1_23
DO - 10.1007/978-3-032-08366-1_23
M3 - Contribución a la conferencia
AN - SCOPUS:105020757418
SN - 9783032083654
T3 - Communications in Computer and Information Science
SP - 348
EP - 364
BT - Information and Communication Technologies - 13th Ecuadorian Conference, TICEC 2025, Proceedings
A2 - Berrezueta, Santiago
A2 - Gualotuña, Tatiana
A2 - Fonseca C., Efrain R.
A2 - Rodriguez Morales, Germania
A2 - Maldonado-Mahauad, Jorge
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 16 October 2025 through 17 October 2025
ER -