Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/5244
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Patel, Namrata | - |
dc.contributor.author | Ukani, Vijay | - |
dc.contributor.author | Mistry, Nilay | - |
dc.date.accessioned | 2014-12-12T05:15:34Z | - |
dc.date.available | 2014-12-12T05:15:34Z | - |
dc.date.issued | 2014-04 | - |
dc.identifier.issn | 0976 - 6480 (Print) | - |
dc.identifier.issn | 0976 - 6499 (Online) | - |
dc.identifier.uri | http://hdl.handle.net/123456789/5244 | - |
dc.description | International Journal on Advanced Research in Engineering and Technology(IJARET), Vol. 5 (4), April, 2014, Page No. 213 - 221 | en_US |
dc.description.abstract | Smart phones have evolved from simple mobile phones into sophisticated yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smart phones run on Android OS are one that continues to be a prime target for hackers. Our focus is mainly on Android-powered mobile device applications. In these days for smart phones, Android has become a very popular operating system. As we all aware, Android is a Linux-based operating system. With this operating system user can easily share applications via online market store i.e. Google market store. But, this platform includes different types of malicious applications. Because malware on device can create numerous risks, which create problems while connectivity because of security consequences. In this paper, it will be described that using methodology how we can analyze malicious behavior of the Android applications so that users can safely use the android smart phones. | en_US |
dc.publisher | IAEME | en_US |
dc.relation.ispartofseries | ITFCE005-10; | - |
dc.subject | Android Mobile Malware | en_US |
dc.subject | Static Analysis | en_US |
dc.subject | Dynamic Analysis | en_US |
dc.subject | Reverse Engineering | en_US |
dc.subject | Smartphone Security | en_US |
dc.subject | Computer Faculty Paper | en_US |
dc.subject | Faculty Paper | en_US |
dc.subject | ITFCE005 | en_US |
dc.title | A Novel Methodology for Analysing Malicious Behavior of the Android Applications | en_US |
dc.type | Faculty Papers | en_US |
Appears in Collections: | Faculty Papers, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ITFCE005-10.pdf | ITFCE005-10 | 903.33 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.