Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/5244
Title: A Novel Methodology for Analysing Malicious Behavior of the Android Applications
Authors: Patel, Namrata
Ukani, Vijay
Mistry, Nilay
Keywords: Android Mobile Malware
Static Analysis
Dynamic Analysis
Reverse Engineering
Smartphone Security
Computer Faculty Paper
Faculty Paper
ITFCE005
Issue Date: Apr-2014
Publisher: IAEME
Series/Report no.: ITFCE005-10;
Abstract: Smart phones have evolved from simple mobile phones into sophisticated yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smart phones run on Android OS are one that continues to be a prime target for hackers. Our focus is mainly on Android-powered mobile device applications. In these days for smart phones, Android has become a very popular operating system. As we all aware, Android is a Linux-based operating system. With this operating system user can easily share applications via online market store i.e. Google market store. But, this platform includes different types of malicious applications. Because malware on device can create numerous risks, which create problems while connectivity because of security consequences. In this paper, it will be described that using methodology how we can analyze malicious behavior of the Android applications so that users can safely use the android smart phones.
Description: International Journal on Advanced Research in Engineering and Technology(IJARET), Vol. 5 (4), April, 2014, Page No. 213 - 221
URI: http://hdl.handle.net/123456789/5244
ISSN: 0976 - 6480 (Print)
0976 - 6499 (Online)
Appears in Collections:Faculty Papers, CE

Files in This Item:
File Description SizeFormat 
ITFCE005-10.pdfITFCE005-10903.33 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.