Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/4813
Title: | Methodology for Analyzing Malicious Behavior of the Android Applications |
Authors: | Patel, Namrata |
Keywords: | Computer 2012 Project Report 2012 Computer Project Report Project Report 12MCE 12MCEC 12MCEC40 |
Issue Date: | 1-Jun-2014 |
Publisher: | Institute of Technology |
Series/Report no.: | 12MCEC40; |
Abstract: | Smart phones have acquired from mere mobile phones into advanced yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smart phones run on Android OS are one that continues to be a prime target for hackers. My focus is mainly on Android-powered mobile device applications. Android has turned a very popular operating system in these days, for smart phones. We all are familiar with Android. It is based on Linux operating system. It is very easy for users to share applications through the Google market place i.e. Play store, with this operating system. But, this platform includes different types of malicious applications. Because malware on device can create numerous risks, which create problems while connectivity because of security consequences. In this paper, it will be depicted that using methodology how we can analyze malicious behavior of the Android applications so that users can safely use the android smart phones. |
URI: | http://hdl.handle.net/123456789/4813 |
Appears in Collections: | Dissertation, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
12MCEC40.pdf | 12MCEC40 | 3.25 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.