SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
213
A NOVEL METHODOLOGY FOR ANALYZING MALICIOUS BEHAVIOR
OF THE ANDROID APPLICATIONS
Namrata A. Patel1
, Vijay Ukani2
, Nilay Mistry3
1, 2
Department of Computer Science & Engg, Institute of Technology, Nirma University,
Ahmedabad, India,
3
Asst. Professor, Department of Digital Forensic Division, Gujarat Forensic Sciences University,
Gandhinagar, India
ABSTRACT
Smart phones have evolved from simple mobile phones into sophisticated yet compact
minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms,
trojan horses and malwares. Until some sealed security measures like application signing and
validation of developers was introduced, the number of infected applications steadily increased.
Smart phones run on Android OS are one that continues to be a prime target for hackers. Our focus is
mainly on Android-powered mobile device applications. In these days for smart phones, Android has
become a very popular operating system. As we all aware, Android is a Linux-based operating
system. With this operating system user can easily share applications via online market store i.e.
Google market store. But, this platform includes different types of malicious applications. Because
malware on device can create numerous risks, which create problems while connectivity because of
security consequences. In this paper, it will be described that using methodology how we can analyze
malicious behavior of the Android applications so that users can safely use the android smart phones.
Keywords: Android Mobile Malware, Static Analysis, Dynamic Analysis, Reverse Engineering,
Smartphone Security.
I. INTRODUCTION
The speedy gain in smart phone users has enabled the application marketplace to develop
extensively. The black market presence has also risen quickly, where paid applications are altered for
free transfer. As an outcome, malicious applications are anticipated to disseminate with raising
frequency [1].
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING
AND TECHNOLOGY (IJARET)
ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 5, Issue 4, April (2014), pp. 213-221
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2014): 7.8273 (Calculated by GISI)
www.jifactor.com
IJARET
© I A E M E
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
214
An Android is an open source operating system. Android smart phones offer advanced
computing ability and connectivity as compared to other mobile operating systems. Android was
initially originated by Android Inc. and was afterward purchased by Google. Android is a Linux
based operating system. It was made for touch screen devices like smart phones, tablets, cameras,
set-top boxes, etc. and has attained the hands of millions of users. The architecture of android
operating system is designed in such manner so that communication at application level and end user
will be quite promiscuous. Android applications are coded in Java, a programming language [7]. But
Android has its own virtual machine i.e. DVM (Dalvik Virtual Machine) and to execute the android
applications, DVM is used.
Android operating system is also used for business purposes. Risk will be high in business
level because people are transmitting sensitive information from one end to another end. As Android
allows remote access to official sensitive data e.g. personal information, which can lead to data hack
if smart phones are hacked into. For this intension of protection, Google has designed their operating
system to execute applications in specified sandboxes, which understate the potentiality of malware
attacks to the applications in smart phones [2].
Due to convenient features inherent in smart phones, the number of smart phone users is
rapidly increasing. People use smart phones for various purposes such as web brows- ing, calling,
SMS, social networking, omnipresent access, and so on. Any technology that is in a lot of hands is a
target for malicious applications. Why not? Both official smart phone application markets such as the
Apples AppStore and Googles Android Market and nonofficial third party application markets called
Black markets have been growing at an eminent rate. However, as the Android Market and
Blackmarkets accept applications without any code review or security checks, hackers can easily
disseminate their malicious applications into the Android Market. That is, hackers can manipulate
any popular application from the market and repackage it to include malicious code. Trojan-SMS.
AndroidOS first appeared in August, 2010, Geinimi in December, 2010 and
Android/Spyware.PJApps.a in March, 2011, Gingerbreak in August, 2011. This represents the major
types of Android malware [6].
The below chart illustrates worldwide smart phone operating system market share from Q1
2010 through Q1 2013[3]. All figures are based on unit sales to end users.
Fig. 1: Android market [3]
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
215
II. OBJECTIVE AND DEFINITIONS
The objective of this research paper is Suspicious Activity Assessment. The below figure
shows the major parts of malware analysis.
Fig. 2: Malware Analysis
Static analysis involves human work to trace and examine malware, is more common because
of the comparatively small number of mobile malware. Static analysis can provide higher quality
results and lead to a better understanding [4].
On the other hand, Dynamic analysis involves automated tools to execute the malware in a
controlled system environment and check for malicious forms. Therefore a large sample of malware
can studied rapidly. Dynamic analysis is not yet common for mobile devices because of the trouble
of replicating the numerous mobile hardware, mobile operating systems, and their many different
versions [4]. Mobile malware also have different ways of spreading as opposed to desktop malware,
which further makes dynamic analysis more difficult. Obfuscation and encryption are quite common
for mobile malware, which also demand for extra steps in the analysis. Other sophisticated
techniques for evasion used by mobile malware include polymorphism (changing variables and
files), and steganography (hiding information in unexpected places). Reverse Engineering is a
process of analyzing an existing code or piece of software in order to scrutinize the software for any
vulnerability or any errors [5]. "Reverse engineering can therefore be stated as a method or process
of modifying a program in order to make it behave in a manner that the reverse engineer desires."
III. DETAILS OF OURANALYSIS METHODS
Our intention as a part of this effort is to identify unauthorized actions of applications that are
not initiated by users. Such activity may be triggered via background running process or self running
script. Our initiation is to characterize programs by statically examining how many such operations
(data or system resource access) found in the application. Mobile apps typically have intense user
interaction, allowing us to approximate implicit user intention with explicit user inputs and actions.
The control flow user interaction procedure is used in this section to describe the analysis. The
algorithm performs the following high level steps.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
216
The final conclusion depends on two step analysis as below.
Scenario 1) Check for Behavior and permissions violation of an app
Scenario 1.1) The first analysis is for those applications which are designed to use only in
offline mode (like some games) but uses internet besides user knowledge. Hacker may use such
behavior to transfer sensitive data. Initially the apk file will be decompiled with the steps described
in the static analysis flow. As a result we will have a source code for the application installed. Then
with the help of String tokenize algorithm every line of code will scan and check for the specific
keyword.
Scenario 1.2) Second attempt is for those applications which runs on internet but connect
with more than one service end point (URL). This indicates some malicious activity without user
knowledge. Some sensitive data may transfer to hacker via second endpoint.
Below figure displays Flow Diagram of Scenario 1.
Fig. 3: Flow Diagram of Scenario 1
As a result of the above mentioned processing, the malicious count can be calculated
depending on the below equation.
Malicious Count(X %) = No. of malicious occurrences *100 (1)
Total No. of lines
Scenario 2) No coupled unused or dead code without User interaction
Static code analysis which is having some lines of code and which do not have coupling
with user action. It means those lines of code which will never going to call by any
action.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
217
Below figure shows the Dependence Diagram of Scenario 2.
Fig. 4: Dependence Diagram of Scenario 2
Logically every user action will create method dependent virtual path within the code.
These paths are dependent on use-cases of individual application. After every possible
virtual path, if we found some classes or methods which is not mapped with any virtual
path node then those lines could be used for malicious activities as those were never
called by any user action.
Different equation will be used to generate the malicious count from scenario 2. This time we will
use the number of dead or unused lines of code which never had been called from any user action.
Malicious Count(Y %) = No. of unused lines * 100 (2)
Total No. of lines
Finally the average value of the result one and two makes the final output result of any application as
below,
Final malicious Count (C %) = X + Y (3)
2
IV. IMPLEMENTATION
Android framework provides simplified utilities to develop quick Android applications. In
eclipse version 3.5, Android plug-in(s) have been installed which provides developer friendly
environment [10]. All the approaches defined in above sections were implemented in a small
application to have a better look on how this approach can work for future industrial use.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
218
The intention behind this project is to generate malware count report for every application
installed on any android device. As android executable (.apk) does not give the direct source code,
with the help of some technique we have to first generate the source code out of the apk file. As a
first step the android framework has to install where the apk file will be process for decompilation.
As a result of apk decompilation the artifacts will be generated as below [5].
Res folder: This folder comprises XMLs specifying the attributes, layout, drawables,
languages, etc.
Android Manifest File: This file is one of the most essential XML file which contains
information about the permissions that the application needs or accesses. In other words
this file contains the Meta data regarding the application.
Smali folder: This folder comprises the source code of the application in .smali format.
Then the next step is to convert .dex files into jar files. The Jar file will contain all the third
party libraries and source code in .class format. Class files are byte code version of java source
which is non human readable. In the next step we will convert that into .java file.
Below figure displays Flow Diagram of the project.
Fig. 5: Flow diagram
Once we have the source code with us, all the approaches which we discussed in section 3 are
implemented programmatically to analyze the code for malicious activity. After this process the
report will be generated, this indicates the malicious count in percentage for each application
installed.
To demonstrate the concept of Malware analysis, a sample application was created. This
application will implement the fundamentals of Malware detection and generates malicious count.
This application can run on any android version. Below images shows how the application will look
like. Figure 6.1 displays the main screen of the application. When user starts processing the
application, it will start scanning for malwares. This scenario is shown in Figure 6.2. As a result the
output will be shown to the user in well defined format as shown in Figure 7.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
219
Fig. 7: Final Output
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
220
Below figure displays Comparison of the different applications in percentage.
17
0.3
6.1
17.32
19.27
4.62
2.83
13.54
0
5
10
15
20
25
ApplicationName
Fig. 8: Graphical Analysis
V. CONCLUSION
Overall, malware analysis is a stimulating and ambitious area of computer security research.
The complication which we have gone through in malware analysis is only one area of the security
profession that is invariably evolving. The most appropriate way of understanding malwares is by
studying the working of an already existing malware. Our initiative with this research is an effort to
protect against threats in this huge security issues in mobile device.
VI. ACKNOWLEDGEMENTS
This research was supported by the Institute of Technology, Nirma University, Ahmedabad,
India and Gujarat Forensic Sciences University, Gandhinagar, India.
VII. REFERENCES
[1] S.-H. Seo, D.-G. Lee, and K. Yim, “Analysis on maliciousness for mobile applications," in
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth
International Conference on, pp. 126-129, IEEE, 2012.
[2] A. G. Kirandeep, “Implementing security on android application," in The International
Journal of Engineering and Science (IJES) Volume 2, Issue 3, pp.56-59, IJES, 2013.
[3] “Androidmarket."http://www.statista.com/topics/840/smartphones/chart/1099/smartphone-
operating-system-market-share/.
[4] E. Erturk, “A case study in open source software security and privacy: Android adware," in
Internet Security (WorldCIS), 2012 World Congress on, pp. 189-191, IEEE, 2012.
[5] Stephen. A.Ridley, "Android Malware Reverse Engineering", Retrieved from:
http://dl.dropbox.com/u/2595211/HelloMotoAndroidReversing.
[6] A. Shabtai, “Malware detection on mobile devices," in Mobile Data Management (MDM),
2010 Eleventh International Conference on, pp. 289-290, IEEE, 2010.
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME
221
[7] A.-D. Schmidt, H.-G. Schmidt, L. Batyuk, J. H. Clausen, S. A. Camtepe, S. Albayrak, and C.
Yildizli, “Smartphone malware evolution revisited: Android next target?," in Malicious and
Unwanted Software (MALWARE), 2009 4th International Conference on, pp. 1-7, IEEE,
2009.
[8] “Comparison of dalvik and java bytecode."
http://forensics.spreitz-enbarth.de/2012/08/27/comparison-of-dalvik-and-java-bytecode/.
[9] T. Eder, M. Rodler, D. Vymazal, and M. Zeilinger, “Ananas a framework for analyzing
android applications," in Availability, Reliability and Security (ARES), 2013, Eighth
International Conference on, pp. 711-719, IEEE, 2013.
[10] Installing the Eclipse Plugin, Android Developers
developer.android.com/sdk/installing/installing-adt.html
[11] A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, “andromaly: a behavioral
malware detection framework for android devices," Journal of Intelligent Information
Systems, vol. 38, no. 1, pp. 161-190, 2012.
[12] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behavior-based malware
detection system for android," in Proceedings of the 1st ACM workshop on Security and
privacy in smartphones and mobile devices, pp. 15-26, ACM, 2011.
[13] H. Lemoine, “The dyana framework dynamic analysis for android,"
[14] “Reverse engineering definition."
http://searchcio-midmarket.techtarget.com/definition/reverse-engineering.
[15] “Android sdk tool." https://developer.android.com/sdk/index.html.
[16] ”Jd-gui tool." http://jd.benow.ca/
[17] Alappanavar, P. B., Ms Ankeeta Bhujbal, and Mr Shantanu Deshmukh. "INTERNATIONAL
JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)." Journal Impact
Factor 4.2 (2013): 237-240.
[18] Asokan M, “Android Vs iOS – An Analysis”, International Journal of Computer Engineering
& Technology (IJCET), Volume 4, Issue 1, 2013, pp. 377 - 382, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
[19] Kirandeep and Anu Garg, “Implementing Security on Android Application”, International
Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013,
pp. 576 - 589, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[20] Anirudha A. Kolpyakwar, Sonal Honale, Piyush M. Dhande and Pallavi A. Chaudhari,
“A Review on Cloud-Based Intrusion Detection System for Android Smartphones”,
International Journal of Advanced Research in Engineering & Technology (IJARET),
Volume 4, Issue 6, 2013, pp. 238 - 245, ISSN Print: 0976-6480, ISSN Online: 0976-6499.
[21] A.Edwinrobert and Dr.M.Hemalatha, “Behavioral and Performance Analysis Model for
Malware Detection Techniques”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 1, 2013, pp. 141 - 151, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.

Weitere ähnliche Inhalte

Was ist angesagt?

Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniquescsandit
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesCSCJournals
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android applicationIAEME Publication
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020TestingXperts
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a surveyIAEME Publication
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...eSAT Journals
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)eSAT Journals
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscriptkarishmakittu
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationIRJET Journal
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”iosrjce
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET Journal
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET Journal
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 

Was ist angesagt? (20)

Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Implementing security on android application
Implementing security on android applicationImplementing security on android application
Implementing security on android application
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Security issues vs user awareness in mobile devices a survey
Security issues vs user awareness in mobile devices  a surveySecurity issues vs user awareness in mobile devices  a survey
Security issues vs user awareness in mobile devices a survey
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
 
A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)A women secure mobile app for emergency usage (go safe app)
A women secure mobile app for emergency usage (go safe app)
 
PhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - ManuscriptPhD Thesis Writing Assistance - Manuscript
PhD Thesis Writing Assistance - Manuscript
 
HinDroid
HinDroidHinDroid
HinDroid
 
P01761113118
P01761113118P01761113118
P01761113118
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”“Design and Detection of Mobile Botnet Attacks”
“Design and Detection of Mobile Botnet Attacks”
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 

Andere mochten auch

A pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlanA pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlanIAEME Publication
 
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistorsAn empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistorsIAEME Publication
 
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistorsAn empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistorsIAEME Publication
 

Andere mochten auch (9)

20320130406003 2-3
20320130406003 2-320320130406003 2-3
20320130406003 2-3
 
50120130406006
5012013040600650120130406006
50120130406006
 
10120140504017
1012014050401710120140504017
10120140504017
 
10220130403003
1022013040300310220130403003
10220130403003
 
A pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlanA pattern diversity compact mimo antenna array design for wlan
A pattern diversity compact mimo antenna array design for wlan
 
20320140504005
2032014050400520320140504005
20320140504005
 
50120130406005
5012013040600550120130406005
50120130406005
 
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistorsAn empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistors
 
An empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistorsAn empirical large signal model for rf ldmosfet transistors
An empirical large signal model for rf ldmosfet transistors
 

Ähnlich wie Analyzing Android Apps for Malicious Behavior

A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...AM Publications
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...IOSR Journals
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...IJECEIAES
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareIRJET Journal
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comIdexcel Technologies
 
Ppt crc nazir_seeds
Ppt crc nazir_seedsPpt crc nazir_seeds
Ppt crc nazir_seedsNazir Dar
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDIJCNCJournal
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONIRJET Journal
 
IRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security FirewallIRJET Journal
 
Penetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesPenetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesIOSR Journals
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityIAEME Publication
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
 

Ähnlich wie Analyzing Android Apps for Malicious Behavior (20)

A017360104
A017360104A017360104
A017360104
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
 
Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...Android-manifest extraction and labeling method for malware compilation and d...
Android-manifest extraction and labeling method for malware compilation and d...
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
 
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.comMobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
 
Ppt crc nazir_seeds
Ppt crc nazir_seedsPpt crc nazir_seeds
Ppt crc nazir_seeds
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
 
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATIONANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
 
Ijmet 10 01_095
Ijmet 10 01_095Ijmet 10 01_095
Ijmet 10 01_095
 
IRJET- Root Security Firewall
IRJET- Root Security FirewallIRJET- Root Security Firewall
IRJET- Root Security Firewall
 
IRJET- Root Security Firewall
IRJET-  	  Root Security FirewallIRJET-  	  Root Security Firewall
IRJET- Root Security Firewall
 
Penetration Testing for Android Smartphones
Penetration Testing for Android SmartphonesPenetration Testing for Android Smartphones
Penetration Testing for Android Smartphones
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSSPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMS
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
Irjet v7 i3811
Irjet v7 i3811Irjet v7 i3811
Irjet v7 i3811
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Analyzing Android Apps for Malicious Behavior

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 213 A NOVEL METHODOLOGY FOR ANALYZING MALICIOUS BEHAVIOR OF THE ANDROID APPLICATIONS Namrata A. Patel1 , Vijay Ukani2 , Nilay Mistry3 1, 2 Department of Computer Science & Engg, Institute of Technology, Nirma University, Ahmedabad, India, 3 Asst. Professor, Department of Digital Forensic Division, Gujarat Forensic Sciences University, Gandhinagar, India ABSTRACT Smart phones have evolved from simple mobile phones into sophisticated yet compact minicomputers. Mobile gimmicks become vulnerable to various threats such as viruses, worms, trojan horses and malwares. Until some sealed security measures like application signing and validation of developers was introduced, the number of infected applications steadily increased. Smart phones run on Android OS are one that continues to be a prime target for hackers. Our focus is mainly on Android-powered mobile device applications. In these days for smart phones, Android has become a very popular operating system. As we all aware, Android is a Linux-based operating system. With this operating system user can easily share applications via online market store i.e. Google market store. But, this platform includes different types of malicious applications. Because malware on device can create numerous risks, which create problems while connectivity because of security consequences. In this paper, it will be described that using methodology how we can analyze malicious behavior of the Android applications so that users can safely use the android smart phones. Keywords: Android Mobile Malware, Static Analysis, Dynamic Analysis, Reverse Engineering, Smartphone Security. I. INTRODUCTION The speedy gain in smart phone users has enabled the application marketplace to develop extensively. The black market presence has also risen quickly, where paid applications are altered for free transfer. As an outcome, malicious applications are anticipated to disseminate with raising frequency [1]. INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2014): 7.8273 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 214 An Android is an open source operating system. Android smart phones offer advanced computing ability and connectivity as compared to other mobile operating systems. Android was initially originated by Android Inc. and was afterward purchased by Google. Android is a Linux based operating system. It was made for touch screen devices like smart phones, tablets, cameras, set-top boxes, etc. and has attained the hands of millions of users. The architecture of android operating system is designed in such manner so that communication at application level and end user will be quite promiscuous. Android applications are coded in Java, a programming language [7]. But Android has its own virtual machine i.e. DVM (Dalvik Virtual Machine) and to execute the android applications, DVM is used. Android operating system is also used for business purposes. Risk will be high in business level because people are transmitting sensitive information from one end to another end. As Android allows remote access to official sensitive data e.g. personal information, which can lead to data hack if smart phones are hacked into. For this intension of protection, Google has designed their operating system to execute applications in specified sandboxes, which understate the potentiality of malware attacks to the applications in smart phones [2]. Due to convenient features inherent in smart phones, the number of smart phone users is rapidly increasing. People use smart phones for various purposes such as web brows- ing, calling, SMS, social networking, omnipresent access, and so on. Any technology that is in a lot of hands is a target for malicious applications. Why not? Both official smart phone application markets such as the Apples AppStore and Googles Android Market and nonofficial third party application markets called Black markets have been growing at an eminent rate. However, as the Android Market and Blackmarkets accept applications without any code review or security checks, hackers can easily disseminate their malicious applications into the Android Market. That is, hackers can manipulate any popular application from the market and repackage it to include malicious code. Trojan-SMS. AndroidOS first appeared in August, 2010, Geinimi in December, 2010 and Android/Spyware.PJApps.a in March, 2011, Gingerbreak in August, 2011. This represents the major types of Android malware [6]. The below chart illustrates worldwide smart phone operating system market share from Q1 2010 through Q1 2013[3]. All figures are based on unit sales to end users. Fig. 1: Android market [3]
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 215 II. OBJECTIVE AND DEFINITIONS The objective of this research paper is Suspicious Activity Assessment. The below figure shows the major parts of malware analysis. Fig. 2: Malware Analysis Static analysis involves human work to trace and examine malware, is more common because of the comparatively small number of mobile malware. Static analysis can provide higher quality results and lead to a better understanding [4]. On the other hand, Dynamic analysis involves automated tools to execute the malware in a controlled system environment and check for malicious forms. Therefore a large sample of malware can studied rapidly. Dynamic analysis is not yet common for mobile devices because of the trouble of replicating the numerous mobile hardware, mobile operating systems, and their many different versions [4]. Mobile malware also have different ways of spreading as opposed to desktop malware, which further makes dynamic analysis more difficult. Obfuscation and encryption are quite common for mobile malware, which also demand for extra steps in the analysis. Other sophisticated techniques for evasion used by mobile malware include polymorphism (changing variables and files), and steganography (hiding information in unexpected places). Reverse Engineering is a process of analyzing an existing code or piece of software in order to scrutinize the software for any vulnerability or any errors [5]. "Reverse engineering can therefore be stated as a method or process of modifying a program in order to make it behave in a manner that the reverse engineer desires." III. DETAILS OF OURANALYSIS METHODS Our intention as a part of this effort is to identify unauthorized actions of applications that are not initiated by users. Such activity may be triggered via background running process or self running script. Our initiation is to characterize programs by statically examining how many such operations (data or system resource access) found in the application. Mobile apps typically have intense user interaction, allowing us to approximate implicit user intention with explicit user inputs and actions. The control flow user interaction procedure is used in this section to describe the analysis. The algorithm performs the following high level steps.
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 216 The final conclusion depends on two step analysis as below. Scenario 1) Check for Behavior and permissions violation of an app Scenario 1.1) The first analysis is for those applications which are designed to use only in offline mode (like some games) but uses internet besides user knowledge. Hacker may use such behavior to transfer sensitive data. Initially the apk file will be decompiled with the steps described in the static analysis flow. As a result we will have a source code for the application installed. Then with the help of String tokenize algorithm every line of code will scan and check for the specific keyword. Scenario 1.2) Second attempt is for those applications which runs on internet but connect with more than one service end point (URL). This indicates some malicious activity without user knowledge. Some sensitive data may transfer to hacker via second endpoint. Below figure displays Flow Diagram of Scenario 1. Fig. 3: Flow Diagram of Scenario 1 As a result of the above mentioned processing, the malicious count can be calculated depending on the below equation. Malicious Count(X %) = No. of malicious occurrences *100 (1) Total No. of lines Scenario 2) No coupled unused or dead code without User interaction Static code analysis which is having some lines of code and which do not have coupling with user action. It means those lines of code which will never going to call by any action.
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 217 Below figure shows the Dependence Diagram of Scenario 2. Fig. 4: Dependence Diagram of Scenario 2 Logically every user action will create method dependent virtual path within the code. These paths are dependent on use-cases of individual application. After every possible virtual path, if we found some classes or methods which is not mapped with any virtual path node then those lines could be used for malicious activities as those were never called by any user action. Different equation will be used to generate the malicious count from scenario 2. This time we will use the number of dead or unused lines of code which never had been called from any user action. Malicious Count(Y %) = No. of unused lines * 100 (2) Total No. of lines Finally the average value of the result one and two makes the final output result of any application as below, Final malicious Count (C %) = X + Y (3) 2 IV. IMPLEMENTATION Android framework provides simplified utilities to develop quick Android applications. In eclipse version 3.5, Android plug-in(s) have been installed which provides developer friendly environment [10]. All the approaches defined in above sections were implemented in a small application to have a better look on how this approach can work for future industrial use.
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 218 The intention behind this project is to generate malware count report for every application installed on any android device. As android executable (.apk) does not give the direct source code, with the help of some technique we have to first generate the source code out of the apk file. As a first step the android framework has to install where the apk file will be process for decompilation. As a result of apk decompilation the artifacts will be generated as below [5]. Res folder: This folder comprises XMLs specifying the attributes, layout, drawables, languages, etc. Android Manifest File: This file is one of the most essential XML file which contains information about the permissions that the application needs or accesses. In other words this file contains the Meta data regarding the application. Smali folder: This folder comprises the source code of the application in .smali format. Then the next step is to convert .dex files into jar files. The Jar file will contain all the third party libraries and source code in .class format. Class files are byte code version of java source which is non human readable. In the next step we will convert that into .java file. Below figure displays Flow Diagram of the project. Fig. 5: Flow diagram Once we have the source code with us, all the approaches which we discussed in section 3 are implemented programmatically to analyze the code for malicious activity. After this process the report will be generated, this indicates the malicious count in percentage for each application installed. To demonstrate the concept of Malware analysis, a sample application was created. This application will implement the fundamentals of Malware detection and generates malicious count. This application can run on any android version. Below images shows how the application will look like. Figure 6.1 displays the main screen of the application. When user starts processing the application, it will start scanning for malwares. This scenario is shown in Figure 6.2. As a result the output will be shown to the user in well defined format as shown in Figure 7.
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 219 Fig. 7: Final Output
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 220 Below figure displays Comparison of the different applications in percentage. 17 0.3 6.1 17.32 19.27 4.62 2.83 13.54 0 5 10 15 20 25 ApplicationName Fig. 8: Graphical Analysis V. CONCLUSION Overall, malware analysis is a stimulating and ambitious area of computer security research. The complication which we have gone through in malware analysis is only one area of the security profession that is invariably evolving. The most appropriate way of understanding malwares is by studying the working of an already existing malware. Our initiative with this research is an effort to protect against threats in this huge security issues in mobile device. VI. ACKNOWLEDGEMENTS This research was supported by the Institute of Technology, Nirma University, Ahmedabad, India and Gujarat Forensic Sciences University, Gandhinagar, India. VII. REFERENCES [1] S.-H. Seo, D.-G. Lee, and K. Yim, “Analysis on maliciousness for mobile applications," in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, pp. 126-129, IEEE, 2012. [2] A. G. Kirandeep, “Implementing security on android application," in The International Journal of Engineering and Science (IJES) Volume 2, Issue 3, pp.56-59, IJES, 2013. [3] “Androidmarket."http://www.statista.com/topics/840/smartphones/chart/1099/smartphone- operating-system-market-share/. [4] E. Erturk, “A case study in open source software security and privacy: Android adware," in Internet Security (WorldCIS), 2012 World Congress on, pp. 189-191, IEEE, 2012. [5] Stephen. A.Ridley, "Android Malware Reverse Engineering", Retrieved from: http://dl.dropbox.com/u/2595211/HelloMotoAndroidReversing. [6] A. Shabtai, “Malware detection on mobile devices," in Mobile Data Management (MDM), 2010 Eleventh International Conference on, pp. 289-290, IEEE, 2010.
  • 9. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 4, April (2014), pp. 213-221 © IAEME 221 [7] A.-D. Schmidt, H.-G. Schmidt, L. Batyuk, J. H. Clausen, S. A. Camtepe, S. Albayrak, and C. Yildizli, “Smartphone malware evolution revisited: Android next target?," in Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, pp. 1-7, IEEE, 2009. [8] “Comparison of dalvik and java bytecode." http://forensics.spreitz-enbarth.de/2012/08/27/comparison-of-dalvik-and-java-bytecode/. [9] T. Eder, M. Rodler, D. Vymazal, and M. Zeilinger, “Ananas a framework for analyzing android applications," in Availability, Reliability and Security (ARES), 2013, Eighth International Conference on, pp. 711-719, IEEE, 2013. [10] Installing the Eclipse Plugin, Android Developers developer.android.com/sdk/installing/installing-adt.html [11] A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, “andromaly: a behavioral malware detection framework for android devices," Journal of Intelligent Information Systems, vol. 38, no. 1, pp. 161-190, 2012. [12] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: behavior-based malware detection system for android," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pp. 15-26, ACM, 2011. [13] H. Lemoine, “The dyana framework dynamic analysis for android," [14] “Reverse engineering definition." http://searchcio-midmarket.techtarget.com/definition/reverse-engineering. [15] “Android sdk tool." https://developer.android.com/sdk/index.html. [16] ”Jd-gui tool." http://jd.benow.ca/ [17] Alappanavar, P. B., Ms Ankeeta Bhujbal, and Mr Shantanu Deshmukh. "INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)." Journal Impact Factor 4.2 (2013): 237-240. [18] Asokan M, “Android Vs iOS – An Analysis”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 377 - 382, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [19] Kirandeep and Anu Garg, “Implementing Security on Android Application”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 576 - 589, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [20] Anirudha A. Kolpyakwar, Sonal Honale, Piyush M. Dhande and Pallavi A. Chaudhari, “A Review on Cloud-Based Intrusion Detection System for Android Smartphones”, International Journal of Advanced Research in Engineering & Technology (IJARET), Volume 4, Issue 6, 2013, pp. 238 - 245, ISSN Print: 0976-6480, ISSN Online: 0976-6499. [21] A.Edwinrobert and Dr.M.Hemalatha, “Behavioral and Performance Analysis Model for Malware Detection Techniques”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 141 - 151, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.