ANDROID APPLICATION MALWARE ANALYSIS


ANDROID APPLICATION MALWARE ANALYSIS

by David Mugisha, 
Student of  Ms.Digital Forensics and Information Security
(Gujarat Forensic Sciences University

ABSTRACT:

Mobile devices have enjoyed unprecedented growth in the last decade. As devices become more ubiquitous and users place more sensitive data on their devices, the amount of mobile malware in the wild has grown. Nowadays, malicious software, which is also known as malware, imposes a larger threat to these mobile devices. Recently, many news items were posted about the increase of the Android malware.
There were a lot of Android applications pulled from the Android Market because they contained malware. The vulnerabilities of those Applications or Android operating systems are being exploited by the attackers who got the capability of penetrating into the mobile systems without user authorization causing compromise the confidentiality, integrity and availability of the applications and the user.

Lack  of knowledge and wide spread of android devices cause a lot of crime related incidents surrounding android devices and among them malwares play a great deal of issues. Hackers gain access to user’s information ,monitor  and record  information about users’ actions on their devices without their knowledge or permission, manipulate  devices to send and intercept text messages resulting in SMS charges, making unwanted phone calls, attempts to steal users’ bank credentials without their knowledge, etc.
The research presented in this paper is an attempt to analyze such an android application and to find out the backbone work of such applications by combining basic static and dynamic analysis techniques and tools to collect and analyze data in an effort to discover infection methods not currently found in android-based devices.
Keywords: Android; malware; dynamic; Static, analysis; malicious.

Read Full Article :
https://www.researchgate.net/publication/332103219_ANDROID_APPLICATION_MALWARE_ANALYSIS

Comments

Popular posts from this blog

Introduction To Big Data Forensics

CYBER SECURITY: Improving Cyber Defense Through Coherent Joint Red Team and Blue Team

Digital Forensics: Investigation VS Security