Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/5244
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPatel, Namrata-
dc.contributor.authorUkani, Vijay-
dc.contributor.authorMistry, Nilay-
dc.date.accessioned2014-12-12T05:15:34Z-
dc.date.available2014-12-12T05:15:34Z-
dc.date.issued2014-04-
dc.identifier.issn0976 - 6480 (Print)-
dc.identifier.issn0976 - 6499 (Online)-
dc.identifier.urihttp://hdl.handle.net/123456789/5244-
dc.descriptionInternational Journal on Advanced Research in Engineering and Technology(IJARET), Vol. 5 (4), April, 2014, Page No. 213 - 221en_US
dc.description.abstractSmart phones have evolved from simple mobile phones into sophisticated yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smart phones run on Android OS are one that continues to be a prime target for hackers. Our focus is mainly on Android-powered mobile device applications. In these days for smart phones, Android has become a very popular operating system. As we all aware, Android is a Linux-based operating system. With this operating system user can easily share applications via online market store i.e. Google market store. But, this platform includes different types of malicious applications. Because malware on device can create numerous risks, which create problems while connectivity because of security consequences. In this paper, it will be described that using methodology how we can analyze malicious behavior of the Android applications so that users can safely use the android smart phones.en_US
dc.publisherIAEMEen_US
dc.relation.ispartofseriesITFCE005-10;-
dc.subjectAndroid Mobile Malwareen_US
dc.subjectStatic Analysisen_US
dc.subjectDynamic Analysisen_US
dc.subjectReverse Engineeringen_US
dc.subjectSmartphone Securityen_US
dc.subjectComputer Faculty Paperen_US
dc.subjectFaculty Paperen_US
dc.subjectITFCE005en_US
dc.titleA Novel Methodology for Analysing Malicious Behavior of the Android Applicationsen_US
dc.typeFaculty Papersen_US
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCE005-10.pdfITFCE005-10903.33 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.