As a simple case, we can check a monitoring and comparison system by recording different classes of system events or function calls, such as API calls or system event lists. In a dynamic analysis mechanism, monitoring module is executed only on emulator. Existing techniques available for the x86 architectures are not immediately applicable to mobile devices executing binaries compiled for the ARM architecture. Therefore, static and dynamic analysis techniques for detecting malware have been proposed. In static analysis, explicit and implicit analysis mechanisms in its source codes are suggested. But these techniques are limited due to the obfuscation tricks used to evade static analysis.