Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4813
Title: Methodology for Analyzing Malicious Behavior of the Android Applications
Authors: Patel, Namrata
Keywords: Computer 2012
Project Report 2012
Computer Project Report
Project Report
12MCE
12MCEC
12MCEC40
Issue Date: 1-Jun-2014
Publisher: Institute of Technology
Series/Report no.: 12MCEC40;
Abstract: Smart phones have acquired from mere mobile phones into advanced yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smart phones run on Android OS are one that continues to be a prime target for hackers. My focus is mainly on Android-powered mobile device applications. Android has turned a very popular operating system in these days, for smart phones. We all are familiar with Android. It is based on Linux operating system. It is very easy for users to share applications through the Google market place i.e. Play store, with this operating system. But, this platform includes different types of malicious applications. Because malware on device can create numerous risks, which create problems while connectivity because of security consequences. In this paper, it will be depicted that using methodology how we can analyze malicious behavior of the Android applications so that users can safely use the android smart phones.
URI: http://hdl.handle.net/123456789/4813
Appears in Collections:Dissertation, CE

Files in This Item:
File Description SizeFormat 
12MCEC40.pdf12MCEC403.25 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.