Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4813
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPatel, Namrata-
dc.date.accessioned2014-08-14T07:26:31Z-
dc.date.available2014-08-14T07:26:31Z-
dc.date.issued2014-06-01-
dc.identifier.urihttp://hdl.handle.net/123456789/4813-
dc.description.abstractSmart phones have acquired from mere mobile phones into advanced yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smart phones run on Android OS are one that continues to be a prime target for hackers. My focus is mainly on Android-powered mobile device applications. Android has turned a very popular operating system in these days, for smart phones. We all are familiar with Android. It is based on Linux operating system. It is very easy for users to share applications through the Google market place i.e. Play store, with this operating system. But, this platform includes different types of malicious applications. Because malware on device can create numerous risks, which create problems while connectivity because of security consequences. In this paper, it will be depicted that using methodology how we can analyze malicious behavior of the Android applications so that users can safely use the android smart phones.en_US
dc.publisherInstitute of Technologyen_US
dc.relation.ispartofseries12MCEC40;-
dc.subjectComputer 2012en_US
dc.subjectProject Report 2012en_US
dc.subjectComputer Project Reporten_US
dc.subjectProject Reporten_US
dc.subject12MCEen_US
dc.subject12MCECen_US
dc.subject12MCEC40en_US
dc.titleMethodology for Analyzing Malicious Behavior of the Android Applicationsen_US
dc.typeDissertationen_US
Appears in Collections:Dissertation, CE

Files in This Item:
File Description SizeFormat 
12MCEC40.pdf12MCEC403.25 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.