Android Platform Malware Analysis
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 1
Abstract
Mobile devices have evolved from simple devices, which are used for a phone call and SMS messages to smartphone devices that can run third party applications. Nowadays, malicious software, which is also known as malware, imposes a larger threat to these mobile devices. Recently, many news items were posted about the increase of the Android malware. There were a lot of Android applications pulled from the Android Market because they contained malware. The vulnerabilities of those Applications or Android operating systems are being exploited by the attackers who got the capability of penetrating into the mobile systems without user authorization causing compromise the confidentiality, integrity and availability of the applications and the user. This paper, it gave an update to the work done in the project. Moreover, this paper focuses on the Android Operating System and aim to detect existing Android malware. It has a dataset that contained 104 malware samples. This Paper chooses several malware from the dataset and attempting to analyze them to understand their installation methods and activation. In addition, it evaluates the most popular existing anti-virus software to see if these 104 malware could be detected.
Authors and Affiliations
Khalid Alfalqi, Rubayyi Alghamdi, Mofareh Waqdan
TGRP: A New Hybrid Grid-based Routing Approach for Manets
Most existing grid-based routing protocols use reactive mechanisms to build routing paths. In this paper, we propose a new hybrid approach for grid-based routing in MANETs which uses a combination of reactive and proacti...
Content -based Image Retrieval for Image Indexing
Content-based image retrieval has attained a position of overwhelming dominance in computer vision with the advent of digital cameras and explosion of images in the Internet and Clouds. Finding the most relevant images i...
Unmanned Ground Vehicle with Stereoscopic Vision for a Safe Autonomous Exploration
At present there are several systems in cars that provide assistance to the driver and the tendency is that these systems are increasingly efficient and that for their operation do not require the intervention of the dri...
A Systematic Literature Review to Determine the Web Accessibility Issues in Saudi Arabian University and Government Websites for Disable People
Kingdom of Saudi Arabia has shown great commitment and support in past 10 years towards the higher education and transformation of manual governmental services to online through web. As a result number of university and...
Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher
A key scheduling algorithm is the mechanism that generates and schedules all session-keys for the encryption and decryption process. The key space of conventional key schedule algorithm using the 2D hybrid cubes is not e...